Title: An Analysis of Ubiquitous Computing Communication Frameworks for RFIDtype Applications
1An Analysis of Ubiquitous Computing Communication
Frameworks for RFID-type Applications
Adam Raby CMSC 691b
2Outline
- Motivation Background
- My Proposal
- Related Work
- Result Expectations
- Future Work
- Conclusions
Adam Raby, CMSC 691b
3Ubiquitous Computing is the Integration of
Computing into all aspects of every-day life
- First defined by Mark Weiser (1991)
- Think of the ubiquity of written languages
- Requires
- Mobility
- Pervasiveness
- Transparency
- Consider Weiser's example of the relative
disappearance of electric motors - We cant assume that our currently technologies
and architectures are optimal
Adam Raby, CMSC 691b
4Ubiquitous Computing Technologies are Everywhere!
- Consider RFID
- With high levels of integration of RFID-like
technology into everyday life, there needs to be
a sound communication framework
Adam Raby, CMSC 691b
5This analysis has to be done before Ubiquitous
Computing can become a reality
- Miniaturization
- Decreasing Power Requirements
- Increasing Wireless Connectivity
- Increasing Pervasiveness
- A Need for a Well-Defined and Empirically
Evaluated Connectivity Framework
Adam Raby, CMSC 691b
6My Proposal
- Gather existing approaches to connectivity
frameworks in ubiquitous computing environments - Compare them empirically
- Extract and formally describe important concepts
and features - Propose ideal frameworks and formally explain any
relevant design decisions
Adam Raby, CMSC 691b
7Related Work
- Römer (2003)
- Investigated the development of a framework for a
"smart" approach to identifying RFID-tagged
objects in a Ubiquitous Computing environment - Smart" behavior a computing environment's
ability to pair objects with their functions,
anticipate events, and monitor object locations - "Smart Toolbox
Kay Römer, Thomas Schoch, Friedemann Mattern, and
Thomas Dbendor- fer. Smart identication
frameworks for ubiquitous computing
applications, 2003.
Adam Raby, CMSC 691b
8Römer The Framework Matters
- Two Approaches
- Jini Distributed Java Objects (Winner)
- Web Services
- Neither did well under heavy-loads
Kay Römer, Thomas Schoch, Friedemann Mattern, and
Thomas Dbendor- fer. Smart identication
frameworks for ubiquitous computing
applications, 2003.
Adam Raby, CMSC 691b
9My Proposal
- Gather existing approaches to connectivity
frameworks in ubiquitous computing environments - Compare them empirically
- Extract and formally describe important concepts
and features - Propose ideal frameworks and formally explain any
relevant design decisions
Adam Raby, CMSC 691b
10Many Models Use RFID Technology to Bridge the
Real and Virtual Worlds
- Radio Frequency Identifier (RFID)
- Small, versatile transponders capable of storing
a small fixed number of bits - There are several different types
- Each type has unique range, power consumption,
and transmission characteristics - The most common forms of these tags are
inexpensive, reliable, and passive - They provide a standardized medium
Adam Raby, CMSC 691b
11RFID Solves Several Problems Facing the
Achievement of Ubiquitous Computing
- Often, attempts to connect the real and virtual
world through specialized input devices and
gadgets are expensive and too application-specific
(Want, 99) - Properly distributing the burden of complexity is
a key issue in ubiquitous computing (Want, 99) - Is it really necessary for a light to know when
someone has entered the room, or is it enough for
something else to know that there is a light and
a person in the room?
Roy Want, Kenneth P. Fishkin, Anuj Gujar, and
Beverly L. Harrison. Bridging physical and
virtual worlds with electronic tags, In CHI,
pages 370-377, 1999.
Adam Raby, CMSC 691b
12Cooltown
- Designed upon three principles
- Ubiquitous access
- Users are able to access outside resources, like
the internet, from virtually any device, using
common protocols - Just enough middleware
- Much less platform and capability dependent
- Locality
- the technology's ability to be aware of its
environment and act accordingly - Uses handheld devices, infrared beacons,
barcodes, and RFID tags to situate its users - The infrared beacons, barcodes, and RFID tags
resolve to URLs for webservers which provide
contextual information about the users
environment - A large wired infrastructure supports the
CoolTown system, managing information about all
the "tagged" people, places, and things
Tim Kindberg and John Barton. A web-based nomadic
computing sys- tem. Computer Networks (Amsterdam,
Netherlands 1999), 35(4)443-456, 2001.
Adam Raby, CMSC 691b
13Cooltown
- CoolTown's researchers rely on several different
technologies to combat some of the shortcomings
of RFID, primarily range - Demonstrates the need for support of
Heterogeneity in Ubiquitous Computing Frameworks
Tim Kindberg and John Barton. A web-based nomadic
computing sys- tem. Computer Networks (Amsterdam,
Netherlands 1999), 35(4)443-456, 2001.
Adam Raby, CMSC 691b
14Hähnel And Colleagues Developed An Approach To
Mapping And Localization Using RFID
- A RFID sensor-equipped robot is able to navigate
and map environments using a laser sensor and a
RFID sensor
D. Hähnel, W. Burgard, D. Fox, K. Fishkin, and M.
Philipose. Mapping and localization with RFID
technology. In Proc. of the IEEE
International Conference on Robotics and
Automation (ICRA), 2004
Adam Raby, CMSC 691b
15Hähnels Work Demonstrated Several Important
Aspects of RFID-Type Systems
- They often require secondary systems (e.g.
lasers) - Theyre highly susceptible to instrumentation
- They require a lot of the receiver
- Are we already leaning towards a system with a
heavily loaded client? - And again, demonstrates the need for
Heterogeneity in Ubiquitous Computing Frameworks
D. Hähnel, W. Burgard, D. Fox, K. Fishkin, and M.
Philipose. Mapping and localization with RFID
technology. In Proc. of the IEEE
International Conference on Robotics and
Automation (ICRA), 2004
Adam Raby, CMSC 691b
16Websigns is an Example of a Completely Virtual
System
- GPS data is used to situate a user in their
environment - Once the Websigns system determines a users
location, it returns any relevant contextual
information to the user based on the Websigns in
their vicinity - Users are expected to have constant access to GPS
data as well as internet access - A central site for maintaining Websigns also
introduces a central point of failure and
difficulties in scalability - In a system that uses actual RFID tags, offline
users would be able to cache data for later
resolution - Real tags provide another level of user
interaction and control
Salil Pradhan, Cyril Brignone, Jun-Hong Cui, Alan
McReynolds, and Mark T. Smith. Websigns
Hyperlinking physical locations to the
Web, Computer, 34(8)42-48, 2001.
Adam Raby, CMSC 691b
17Theres A Lot to Learn Just By Gathering Current
Frameworks
Adam Raby, CMSC 691b
18My Proposal
- Gather existing approaches to connectivity
frameworks in ubiquitous computing environments - Compare them empirically
- Extract and formally describe important concepts
and features - Propose ideal frameworks and formally explain any
relevant design decisions
Adam Raby, CMSC 691b
19These Systems Can Be Analyzed Using Network
Analysis Tools
- Virtual Inter-Network Testbed (VINT)
Adam Raby, CMSC 691b
20Model Ubiquitous Frameworks as Computer Networks
Internet
Web Service
Tagged Artifact
Internet
Tagged Artifact
User
User
User
Tagged Artifact
Adam Raby, CMSC 691b
21This Approach Provides Several Common Methods of
Evaluation
- Metrics
- Throughput
- Latency
- Message Complexity
- Error Rates
- Bottlenecks
- Behavior Under the Atypical Loads of a Ubiquitous
Computing Environment
Adam Raby, CMSC 691b
22Behavior Under the Atypical Loads of a Ubiquitous
Computing Environment
Adam Raby, CMSC 691b
23My Proposal
- Gather existing approaches to connectivity
frameworks in ubiquitous computing environments - Compare them empirically
- Extract and formally describe important concepts
and features - Propose ideal frameworks and formally explain any
relevant design decisions
Adam Raby, CMSC 691b
24I Expect to Find
- High dependency on individual users capabilities
- Major performance characteristics of various
frameworks (Existing, Cellular, P2P, etc.) - Bottlenecks can be optimized using DNS-style name
resolution caching - A large potential for P2P-based optimizations
- This may introduce security and coherence issues
Adam Raby, CMSC 691b
25Questions?
Adam Raby, CMSC 691b