1 / 20

Ubiquitous Computing Class Introduction

Ubiquitous Computing Class Introduction. Hoon Oh University of Ulsan. Course Information. Instructor: Hoon Oh ( hoonoh@ulsan.ac.kr ) Engr. Bldg 7-225 (052-259-1257) cic.ulsan.ac.kr/~hoonoh T.A: Chang-Wan Ha ( imagineer81@naver.com ) Engr. Bldg 7-206 (052-259-1437) 유비쿼터스 센서네트워크기술

kat
Download Presentation

Ubiquitous Computing Class Introduction

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Ubiquitous ComputingClass Introduction Hoon OhUniversity of Ulsan

  2. Course Information • Instructor: Hoon Oh (hoonoh@ulsan.ac.kr) • Engr. Bldg 7-225 (052-259-1257) • cic.ulsan.ac.kr/~hoonoh • T.A: Chang-Wan Ha (imagineer81@naver.com) • Engr. Bldg 7-206 (052-259-1437) • 유비쿼터스 센서네트워크기술 • Homework and Projects

  3. Trends in Computing

  4. Ubiquitous (Pervasive) Computing • Era 1: Mainframes (past) • Central, “powerful” and expensive computer • Many users access a single computer from “dumb” terminals • Used for enterprise data processing • COBOL, Database, etc • Computer not easily accessible • IBM 360, IBM370, DEC, HP

  5. Ubiquitous Computing (Cont…) • Era II: Personal computers (present) • “Powerful” and relatively inexpensive computers • At least one machine per user • Used for word processing, personal productivity applications, video, audio etc • Powerpoint, MS Word, Web browser etc.. • Computer still not that accessible

  6.  Ubiquitous Computing (Cont…) • Era III: Post-PC (future) • Explosion in number and variety of computing devices • A number of devices/machines share one user • Devices (inexpensive) vary in complexity and function • Used to make “our lives better” • Computers become “invisible”

  7. Key requirements for ubiquitous computing All the devices are network capable, though not necessarily connected all the time. The devices can communicate with each other. Thus a computer in your washer, microwave, car emission controller, laptop projector, etc are not ubiquitous devices unless you can connect and modify their behavior. Devices communicate to seamlessly simplify our lives

  8.  Example Ubiquitous scenario • You want to setup an appointment to meet me. You walk up to me and make an appointment • Underlying processes: • Location: So that I can figure out your computer incarnation • Communication: So we can decide on how to talk to my appointment scheduler. We have to figure out the mechanisms (Bluetooth), protocols (XML over TCP) • Authentication: So that I can know who you are and let you see my “appropriate” calendar • Authorization: So that I can let you make an appointment • Consistency management: So that the appointment that I made is reflected “everywhere”

  9. Another ubiquitous scenario • My flight gets delayed and so I can’t keep the appointment. Our appointment is converted to a telephone call, I automatically call you from the InFlight phone to a pay phone near you • Authentication • Authorization: so I can know where you are and entities around you • Location management: so I know how to contact you (Inflight phone and pay phone near you) • Socially appropriate: don’t route the lovers call to the spouses’ home phone!!

  10. Course Organization • Fairly new and emerging area – no “right solution” • I encourage open discussion about the technologies that comprise ubiquitous computing • Papers will complement class lectures

  11. Grading policy • Class participation 10% • Paper evaluation 10% • Midterm 30% • Homework 20% • Projects/Final oral exam 30%

  12.  More Examples of Smart Objects • Class participation is very important. You will be graded on your involvement in class discussions. There are no “dumb” questions. You will only be penalized for “no” questions/comments • Over the course of the semester, you will read and critique several papers. You will discuss your criticisms during the class discussion. Critiquing other work is a good way to start thinking of a better solution

  13.  Homework projects • During the first half of the semester, you will assigned a programming project that is due every two weeks. • Projects are individual efforts. • Each project should be electronically turned in with a succinct report on your implementation strategy and what you learned. • Projects should compile without any modifications • I will randomly select submissions for an one-on-one oral interview

  14.  Course Project • Teams of 3 students. Start thinking about what you want to do w/ partners etc. • Individual grades influenced by the final oral examination and presentation. • We can talk about the project ideas • You will explore a substantial topic and show its validity with an implementation • At the end of the semester, there will be a mini-symposium where you will publically present your work. Best idea, implemenation, and presentation will be recognized.

  15.  Reevaluation policy • Arithmetic errors, missed grading will be reevaluated. • I encourage you to discuss concerns with your solution with me • I discourage re-evaluation of partial credits: • Football penalty policy: If you think you deserve a better partial grade, write down the reason why you think that you deserve a better grade and how many extra points you think you deserve. If I agree, you could get upto this many extra points. If I disagree, you will lose this much points.

  16. Academic Honesty • Freedom of information rule: • Collaboration is acceptable • To assure that all collaboration is on the level, you must always write the name(s) of your collaborators on your assignment. Failure to adequately acknowledge your contributors is at best a lapse of professional etiquette, and at worst it is plagiarism. Plagiarism is a form of cheating.

  17. The things that we have 30개 MTS-DS1000 (USN Mote에 탑재되는 센서보드, CO, CO2, 온도 감지) MTM-CM2000 (초절전 MCU(MSP430) 탑재, TinyOS기반, 건전지홀더 일체형, 지그비(Zigbee)모듈, 센서보드 탑재가능 15개 MTS-SE1000 (USN MTM-CM1000-MSP Mote에 탑재되는 센서보드, PIR, Magnetic, Microphone감지) MTI-USB1000 프로그램 다운로드&게이트웨이 보드, USB 연결타입으로 간편한 연결이 가능) MTS-CO1000 (USN Mote에 탑재되는 센서보드, 가속도,Tilt, 압력) MTS-EM1000 (USN MTM-CM1000-MSP Mote에 탑재되는 센서보드, 온도, 습도, 조도, 진동 감지)

  18. The things that we have (cont…) • RFID Reader 2 sets • Metal RFID Tag 10개 • Tape Type Tag 20개 • 무게선서 1개 • 초음파 위치추적 시스템 • 기울기 센서

  19. Projects… • 스마트 Artifact 개발 • 광대역 통신 기반에서의 지능형 해상서비스 개발

  20. 과제내용구성 • 과제배경 • 서비스 시나리오 (아이디어를 그림 및 서비스 절차 (알고리즘)를 사용하여 쉽게 설명) • 요구사항 분석 (기능, 비기능, 개발 툴등) • 추진내용 및 일정 • 시스템 아키텍쳐 및 설계 • 구현 • 테스트시나리오

More Related