S.M. Roychoudri, P.N.V. Satyasree Choudri and P.A. Abdul Saleem

advertisement
62
Mobile and Pervasive Computing (CoMPC–2008)
A Hypothetical Scrutiny of Pervasive Computing to an
Ubiquitous Computing through Web Technique
S.M. Roychoudri1, P.N.V. Satyasree Choudri2 and P.A. Abdul Saleem3
Department of Computer Science & Engineering,
ASR College of Engineering, Tanuku, (Affiliated to JNTU), West Godavari District, Andhra Pradesh
E-mail: 1roychoudri_76@yahoo.co.in, 2satyasreekpnv@gmail.com, 3saleemhod@yahoo.co.in
ABSTRACT: Ubiquitous computing refers to building a global computing environment where seamless and invisible
access to computing resources is provided to the user. Pervasive computing deals with acquiring context knowledge
from the environment and providing dynamic, proactive and context-aware services to the user. A Ubiquitous
computing environment is created by sharing knowledge and information between pervasive computing
environments. In this paper, we propose a framework that uses the potential of the Web Technique to weave
pervasive computing environments into a Ubiquitous-computing environment. We discuss how the collaboration of
these pervasive environments can create an effective Ubiquitous computing environment referred herein as the
Integrated Global Pervasive Computing Framework (IGPF). We test the effectiveness of the Ubiquitous environment
through a small scenario from a prototype system that we have implemented over this framework to handle Home
application, Automotive, Mobile team work, and medical emergency scenario.
Keywords—Ubiquitous Computing, Pervasive Computing, Web Technique.
INTRODUCTION
W
e believe that Ubiquitous computing is the next
wave of computing after the Internet wave.
Ubiquitous computing aims to revolutionize the current
paradigm of human computer interaction. Computers have
been used in various aspects of human life, but in most
cases human beings have to adapt their behavior to each
system. Ubiquitous computing as envisioned by Weiser is a
computing environment computing systems weave
themselves in the fabric of everyday life and become
invisible. Invisibility is the most important aspect of
Ubiquitous computing. The user is exposed to a few sets of
services available to him/her and is oblivious to the
complex system implementing those services. This takes
the human-computer interaction into a whole different
dimension, where the user is surrounded by a complete
smart environment with devices/sensors communicating
with each other and aggregating their functionalities to
provide a set of consolidated services. The terms
Ubiquitous computing and Pervasive computing are used
interchangeably, but they are conceptually different.
Ubiquitous computing uses the advances in Mobile
computing and Pervasive computing to present a global
computing environment. Mobile computing is about
elevating computing services and making them available on
mobile devices using the wireless infrastructure. The focus
here is to reduce the size of the computing devices so that
they can be carried anywhere or by providing access to
computing capacity through high-speed networks. But
Mobile computing has some limitations. Pervasive
computing, on the other hand, is about acquiring context
from the environment and dynamically building computing
models dependent on context. Pervasive computing is
invisible to human users and yet provides useful computing
services. Ubiquitous computing aims to provide Pervasive
computing environments to a human user as she/he moves
from one location to another. We present an alternate
approach and use Web technique for Pervasive computing
environments. This allows context information to be stored
on the Web and then shared across Pervasive computing
environments via the Web to provide context-aware
services.
MOTIVATION
Existing methodologies for implementing a Ubiquitous
computing environment use smart devices, which have
some processing power and are specialized in a set of
specific tasks. Usually the user needs to carry these devices
with her/him as s/he moves either within or across
pervasive environments. These devices are not readily
available and are often difficult to build. Our solution
eliminates the need for smart devices by using the Web
Technique to build dynamic context models as a user
moves from one environment to another. We can achieve
dynamic building of contexts by sharing knowledge and
context information between local pervasive environments
through the Semantic Web.
PROPOSED SOLUTION
The idea of creating global smart environments doesn’t
need to expand a smart space to a global level. This is
similar to the idea of the global Internet, where numerous
small physical networks connect together to form a large
A Hypothetical Scrutiny of Pervasive Computing to an Ubiquitous Computing through Web Technique
homogenous network. Similarly, a better approach here
is to connect these smart environments together
‘Semantically’ so that they conglomerate into a virtual
global smart environment similar to the Internet, creating a
Ubiquitous environment.
Fig. 1: User rôle Model in Ubiquitous Environnent
65
A Home Application Scenario
You arrive at home, tired after a day’s work. The house
identifies you and unlocks the door. Recognizing the
fatigue on your face, the home entertainment system starts
playing your favorite relaxing music, and replaces the
artwork on the electronic wallboards with soothing images
of nature. As you enter the bathroom, you are asked if a
warm bath should be started. As you enter the kitchen, the
display on the refrigerator door suggests a light meal and a
specific recipe on the basis of the available ingredients in
the refrigerator and fitting your mood. If you accept the
suggestion, step-by-step instructions are displayed, helping
you through the steps of the recipe. Once you place the
bowl on the stove, the temperature is automatically
adjusted to control the cooking time on the basis of your
decision whether to take a bath.
In daily life, an average human being is associated with
many different environments and has different roles in
each. For example, in Figure 1, Dr. Smith is associated
with environments like hospital, bank, and pub and plays
the role of doctor, client, and customer, respectively. A
Ubiquitous system should truly reflect this real life
scenario.
Each of these environments may be an independent
smart system since they belong to different
domains/organizations they are disparate. What’s important
is that as the user moves from one environment to another,
the system transparently recognizes the user and associates
the user’s specific roles with the domain the user enters.
The system passes information required by the user
(files/contact information, etc.) between domains,
accessing/updating the user profile as needed, etc. which
allows the user to receive appropriate services. This true
sense of Ubiquitousness can be achieved only if the two
environments are semantically integrated.
An Automotive Scenario
PERVASIVE COMPUTING SCENARIOS
A Health Scenario
Scenarios
Your health monitor, possibly installed in your watch,
notices that your blood sugar is suddenly elevated. It starts
to monitor other conditions more closely to uncover
possible causes and potential problems. It contacts your
medicine cabinet to ensure that you have adequate
medicine in your home and contacts the pharmacy for
additional medic- ine if necessary. It reports the change to
your electronic medical record and sends a short message
to your doctor, informing the doctor of your current
location and evening plans in case the doctor needs to
contact you. Back at home, the kitchen notifies the
refrigerator to mark all sweets in your home off-limit for
you and suggests a healthy recipe for the evening! These
scenarios may appear far-fetched, although they rely mostly
on known technologies. The same technologies may be
used today for more near-term scenarios. In our European
The possibilities for applications of pervasive computing
are only limited by our imagination. Many imaginative
scenarios have been expounded in the literature. Such
scenarios help in recognizing the many possibilities and
also help to identify research goals. Some scenarios are
visionary ones that aim to establish long-term goals, the
parameters of the needed research, and the interdependence
of the research in pervasive computing with that of other
domains. The less visionary ones are used to define shortto mid-term research or product-development projects.
Some scenarios are created for advocating the importance
of the field and drumming up support. Let us consider the
first four different application domains: home, automotive,
mobile and health.
You are driving to a distant area for a two-week vacation.
You plan to explore the area by car during your stay. On
the way, your engine detects an irregularity in the operation
of the motor. It flashes a warning sign to you cautioning
you to drive more carefully and starts a diagnostic
procedure. It detects the offending part and sends a report
to your car manufacturer. The manufacturer locates the
garage nearest to your location and dispatches the part to
the garage from a nearby depot. The garage sends a
replacement car to meet you on the highway. In the
meantime, the police have been notified to look for possible
traffic tie-ups in your area. The car display directs you to a
specific parking area off the highway to meet the driver that
delivers your replacement car. You continue on your
vacation and the driver takes your car to the garage. Once
the car is repaired, it will be delivered to your hotel, using
the information from your itinerary posted by your travel
agent, aided by the positioning system in your car.
66
project called MOTION, we are building an infrastructure
and tool to support the following scenario:
A Mobile Teamwork Scenario
A multi-national organization has many sites around the
world and employees who travel frequently. Traditional
working groups, with well-defined management and
reporting structures are being augmented with, and in some
cases replaced with, adhoc teams formed for a welldefined, focused, short-term purpose. For example, a
particular design flaw is suspected in a product, such as a
mobile phone, that is deployed in the field. A team must be
formed from potential expert employees around the world
to examine, discuss, and propose a solution to the problem.
Virtual meetings must be held to support communication
and problem solving. Some members may be traveling and
have access to limited computer and display capabilities.
They may be in different time zones. The infrastructure
must support access to large amounts of information and
documents, synchronous and detached communication
among people, and event notification. For example, one
member may need to be notified as soon as some particular
document becomes available or another member comes online. Many of the needed technologies to integrate such a
system, such as chat and instant messaging are already
available. But they need to be integrated in new ways to
meet the demands of the new environment. The pervasive
computing environment is characterized by heterogeneity
(of devices and networks) and unpredictability and lack of
structure of communication patterns.
INFRASTRUCTURE FOR PERVASIVE
APPLICATIONS
Infrastructure
The architectures must enable high interconnectivity,
highly dynamic interactions among diverse components,
and a high level of coordination among different and
heterogeneous, possibly independently-designed activities.
An infrastructure for pervasive computing must therefore
enable components to recognize, communicate with, and
coordinate with each other. While the infrastructure should
enable free and rapid interaction among components, not
all accesses should be allowed.
Software Components for Pervasive Computing
Pervasive services will have to be composed from
individual “components” residing in the large number of
heterogeneous computing elements. The hardware
environment itself will force a natural boundary between
components. This may be the most clear-cut definition of a
component. A component will be an independently
deployable piece of software that resides on one hardware
element and provides a service element. Of course, there
Mobile and Pervasive Computing (CoMPC–2008)
may be more than one component on each hardware
element. Just as Web Services are emerging in the Web
computing infrastructure as a “component”.
Components are basically of the same “size” and
“power.” For example, JavaBeans components are for
desktop environments while Enterprise JavaBeans are for
server and enterprise-wide components. To make
application development manageable, we probably need a
single component model that is “scalable”.
One of the key problems of building applications out of
components—component based software engineering—is
what to do if the component you need is not available in the
catalogs you have. Clearly, no catalog will have every
component that an application developer needs. But, often,
there will be a related component, or one that is “almost”
the one needed. There are several possible paths to take in
this case. One is for the developer to modify the related
component to make it fit his needs. A more effective
approach is to automatically “adapt” the existing
component to the need of the application.
Device Heterogeneity
The basic premise of pervasive computing everything
connected guarantees heterogeneity at all levels:
infrastructure, hardware, software, and people. All kinds of
devices must be supported. In general, the environment
must anticipate the existence of a wide variety of devices.
If we consider devices used by the user to interact with the
system, they can range from standard ones such as laptops,
PDAs, and phones, to emerging ones such as those
embedded in clothing and eyeglasses.
One is the kind of input-output devices: textual and
graphic input-output will not be the only forms of humanmachine interaction. Audio, visual, and other sensory
modes of communication will be prevalent. Another
implication is the requirement that the environment must be
prepared to adapt to the device currently used by the user.
For example, if the user is requesting information and he is
currently driving, the retrieved data should be relayed to
him with an audio message through the car radio.
Access Control
The wide availability of services and the high mobility of
users among different environments require the provision
of security mechanisms to ensure the safe usage of services
by legitimate users and the protection of services from
unauthorized uses. Because of the wide range of services,
many diverse and flexible security models and mechanisms
will be needed.
One of the most important aspects of security is access
control, to ensure that services are only available to
authorized users and those authorized users are allowed
appropriate privileges. For example, a guest at a hotel may
be allowed to print on the hotel’s printer available in the
A Hypothetical Scrutiny of Pervasive Computing to an Ubiquitous Computing through Web Technique
lobby but not change the contents of the event display in
the same lobby. We have been working in two directions to
help application developers include sophisticated access
control in their applications.
The access control subsystem and the architectural style
mentioned here are two building blocks that may be used
for pervasive computing applications. But much more is
needed. In fact, more flexible and powerful security models
are needed to protect services that are composed of
distributed service components. It is reasonable for a user
to provide a password once to authenticate him or her. But
the user should not have to provide passwords each time a
new service is being contacted.
ARCHITECTURE OF IGPF
Following points were considered while designing
Integrated Global Pervasive Computing framework (IGPF).
IGPF should be generic. That means we should be able to
use IGPF to setup a pervasive computing environment for
any domain. For example, the IGPF can be used to setup a
pervasive computing environment for a hospital or for an
office with little modification. For example, one of the core
components, the KB Handler is used to query and inference
on the knowledge base of the system. The domain specific
components provide knowledge and services specific to the
domain. If the IGPF is used to setup a pervasive computing
environment in a hospital, then the knowledge base will
consist of domain specific ontology’s like the drug
ontology and patient ontology; IGPF should use shared
knowledge. We use the Web Technique based approach
where the shared knowledge is stored on the Web and it
can be accessed by different environment.
UI Manager
Profile Manager
KB Handler
Resource Manager
Unified
Information Base
Autonomous System Head
Fig. 2: IGPF Architecture
E
V
E
N
T
M
A
N
A
G
E
R
67
CONCLUSION
The approach presented in this paper introduces a whole
new way of implementing Ubiquitous computing by
semantically connecting different and diverse pervasive
environments. Connecting these environments through the
Web Technique enables sharing of knowledge and
information across pervasive environments, thus allowing
environments to dynamically create context models for a
user as s/he walks from one environment to another. The
impact of the designed framework is that it creates the
generic base for achieving these basic functionalities along
with offering the user a set of abstract services.
Furthermore, the environments can be ‘programmed’ to
achieve specialized applications that use the services within
a pervasive environment and also share and utilize the
services offered through access to other environments. We
believe that the impact of such a framework will speed up
the process of creating local pervasive environments and
build true Ubiquitous environments based on them. As a
whole, our work aims to use computing resources to create
Ubiquitous environments to improve the way we utilize
services that pervasive computing environments provide
and in general, benefit our daily lives.
REFERENCES
[1] Berners-Lee, T. (1994). Universal Resource Identifiers in
WWW: A Unifying Syntax for the Expression of Names and
Addresses of Objects on the Network as used in the WorldWide Web Retrieved December 3, 2004.
[2] Berners-Lee, T. (2003). Primer: Getting into RDF &
Semantic Web using N3. retrieved December 3, 2004, from
http://www.w3.org/2000/10/swap/Primer
[3] Berners-Lee, T., Hendler, J. & Lassila, O. (2001). The
Semantic Web. Scientific American.
[4] Berners-Lee, T., Masinter, L. & McCahill, M. (1994).
Uniform Resource Locators (URL). (RFC 1738) CERN,
Xerox Corporation, University of Minnesota.
[5] [Fenkam01] Fenkam, P., A Dynamic User Management
Access Control for Web Sites”. Distributed Systems Group,
Master’s Thesis, Technical University of Vienna and
Institute for Software Technology, Technical University of
Graz, 2001.
[6] [Fenkam02] Fenkam, P., Gall, H. and Jazayeri, M., “DPS—
An Architectural Style for Development of Secure
Software.” In Proceedings of the Infrastructure Security
Conference (Bristol, 1–3 Oct, 2002), Springer Verlag.
[7] [Garlan02] Garlan, D., Siewiorek, D.P., Smailagic, A. and
Steenkiste, P., “Project Aura: Toward Distraction-Free
Pervasive Computing,” Pervasive Computing, April–June
2002.
[8] [Gschwind02] Gschwind, T., Adaptation and Composition
Techniques for Component-Based Software Engineering,
PhD dissertation, Distributed Systems Group, Technical
University of Vienna, 2002.
Download