Emerging Technologies07 Chapter6
Emerging Technologies07 Chapter6
Ubiquitous Computing
David Ley, Becta
The most profound technologies are those that disappear. They weave themselves into
the fabric of everyday life until they are indistinguishable from it.
Mark Weiser1
18 Mainframe (one computer, many people)
Ubiquitous computing is a vision of computing
16 PC (one person, one computer)
power ‘invisibly’ embedded in the world around
Ubiquitous Computing
14
us and accessed through intelligent interfaces: ‘Its (one person, many computers)
highest ideal is to make a computer so embedded, 12
1945
1950
1955
1960
1965
1970
1975
1980
1985
1990
1995
2000
2005
and using the power of networked computing
systems which will be connected not just to the The three waves of computing [Source: http://sandbox.
internet or other computers, but to places, people, xerox.com/ubicomp/]
1 Weiser, M. (1991): The Computer for the 21st Century. In: Scientific American 265, Nr. 3, S. 94-101.
2 Weiser, M http://sandbox.xerox.com/ubicomp/
3 ‘Things’ here means objects and devices that are not computers 64
6
This is what the International Telecommunication Many parts of ubiquitous computing are still in
Union (ITU) calls the ‘internet of things’4. These new development and many of the possible uses and
connections create the possibility of new interactions implications of the technologies are still unknown.
and access to enormous amounts of information. However, there are already clear possibilities for
This changes the web from being a purely virtual, improving learning both through individual technologies
online space to a system that can provide appropriate and increasingly through using these technologies
information, help and services in the real world. If in unison. As will be explored, ubiquitous computing
properly harnessed this information will make us better technologies can lower the barriers to using the power
informed and enable smarter decisions by both people of ICT, enable much more personalised, context-aware
and machines.
interactions and help with a move to more experiential
These technologies have modes of use that can be learning: learning by doing, interacting and sharing.
implicit or explicit. Explicit interactions are those where a
conscious action by a user enables an interaction. Implicit
interactions are automatic and can happen without any
direct user intervention. Our opportunities for explicit Key elements of ubiquitous
interactions with the real world are increasing, but it is the computing
implicit, unseen interactions that will provide a real shift in
The key elements that devices/objects/nodes in
how we use and gain benefit from computer systems.
a ubiquitous computing environment need are:
Ubiquitous computing encompasses most areas of identification, location, sensing and connectivity
IT and achieving the vision will rely on several factors
coming together: Identification
• Miniaturisation (smaller, lower power processors, In order for objects and devices to usefully become
sensors and wireless technologies.) part of a wider intelligent, information sharing network,
• Ubiquitous connectivity it is vital that each one has a unique identity. This not
only enables more things to be interconnected, it also
• Interoperability (standards for networks and devices;
means that objects that surround us can become
identification; network and device discovery; self-
resources and act as interfaces to other resources. Two
configuring, seamless networks etc.)
important technologies used to provide identity are Radio
• Improved intelligent interfaces (natural interfaces;
Frequency Identification (RFID) tags and visual barcodes.
intelligent agents; display technologies etc)
• Intelligent systems (including sensor networks; RFID
context awareness; location; semantic networks; data Radio Frequency Identification (RFID) is a type of
handling; and search etc.) auto identification system and refers to technologies
• Security and reliability (reliable, secure systems; and that use radio waves to identify objects, locations or
privacy features) people. RFID is a generic term and does not refer to a
particular technology. However, more recently, the term
4 ITU Internet Reports 2005: The Internet of things (ITU 2005 7th edition) 65
6
has become associated with a form of the technology ABI Research5 believes that by 2009 50 per cent of
called RFID tags. These are tiny microchips attached to mobile phones will have embedded RFID chips to
antennae (transponders). The data on these chips can access services and pay for goods. This technology is
be read by a wireless reader (transceiver) and the data already being used in Japan [http://www.nttdocomo.
passed back to computer systems. There are two main com/presscenter/pressreleases/press/pressrelease.
types of RFID tags: passive (energy harvested from the html?param[no]=474].
reader) and active (with their own power supply). The In education the main use of RFID tags so far has been
more sophisticated tags offer read/write capabilities. in library management systems, for asset tagging and
RFID chips can be as small as 0.05 mm2 and can be ID/tracking purposes. However, a number of more
embedded in paper. More recently, printable tags have innovative education projects have shown the value of
been developed. RFID systems do not require line learners being able to interact with tagged objects in
of sight and work over various distances from a few the real world. For example, an object’s ID could trigger
centimetres to 100 metres depending on the frequency information or sounds to be sent to a learner’s device.
used and type of system. Standards for tags and Such systems are increasingly being used in museums
electronic product codes (EPC) are being overseen by [http://www.rfid-weblog.com/50226711/rfid_in_
EPC Global [http://www.epcglobalinc.org]. museums_another_growing_market.php].
The ability to identify, locate and track RFID tags is seen RFID tags can also play a part in creating intelligent
as a transformational technology, potentially allowing classrooms (see below).
any object to be interrogated by computer systems. RFID readers can now also be included in mobile
However, high costs, technical issues and concerns phones, potentially making the readers as ubiquitous
about privacy will need to be overcome before RFID tags as the tags are expected to become. However, RFID
become widespread. Currently, the main area of use is tags can operate without user intervention, automating
in the retail supply chain, but analysts predict that 50 per many applications and providing huge amounts of data,
cent of the uses for RFID in 2012 have not even been which creates a need for more sophisticated systems to
thought of yet. support them (see data handling).
The retail/supply sector is only one area of use for the
technology. Some examples of other uses are: security,
authentication of goods/banknotes [http://networks.
silicon.com/lans/0,39024663,39122553,00.htm],
asset tagging, document tagging, library book tagging,
road tolls, safety systems, and payment systems. RFID
is already in use in contactless card systems for door
entry and on public transport such as the London
Underground [http://www.rfida.com/nb/oyster.htm].
IPv6
An alternative technology that could be used for identification is Internet Protocol version 6. IPv6 is the next
generation protocol designed by the IETF6. Currently the internet and most networks rely on IPv4 addresses which
have a limit of 232 addresses. IPv6 provides 2128 potentially allowing billions of unique IP address. IPv6 also offers
other advantages over IPv4 such as support for auto-configuration of devices, Quality of Service (QoS), mobility
and security. However, adoption of IPv6 is expected to happen relatively slowly, with most interest currently coming
from government/military and research organisations.
The ability of objects and devices to have location to a users’ device, or automatic connection to a large
information adds another important level of intelligence, display, for example. Other location services are about
allows the discovery of people, objects and resources knowing your relationship to other people or devices.
and enables location based tools and services. Indeed, MIT’s iFind service allows students and staff to let other
location services are expected to be increasingly people know their location on campus [http://ifind.mit.
important over the next few years. It is predicted that edu/]. Mobile location based services are increasingly
there will be 70 million GPS enabled phones in Europe combining presence (information about the status of a
by 2010 (IMS Research7). Tim O’Reilly, who coined user) with location information [http://www.mologogo.
the term Web 2.0, has now started a new annual com/]. Some countries are using these technologies to
conference called Where 2.08, underlining the potential track students for safety and control reasons, but these
for innovation in this area. raise concerns over privacy (see issues). For example
the Japanese government is piloting a system using
Devices and objects can establish their location in a
RFID, GPS and mobile phones to track students and
variety of ways and to varying levels of accuracy. At a
keep parents informed of their whereabouts [http://
basic level an RFID tag can be recognised as it passes
ubiks.net/local/blog/jmt/archives3/005856.html
a fixed wireless reader. Devices with accelerometers can
and http://www.sankei.co.jp/seiji/seisaku/070103/
detect motion and know their orientation. Wi-Fi enabled
ssk070103000.htm]
devices can be tracked to a reasonable degree of
accuracy (for example Ekahau9 systems). Mobile phones Real world search
can also be pinpointed, but the accuracy can vary
More recently, location systems allow the user to point
considerably. It is with the advent of inexpensive satellite
cameraphones at an object or location and receive back
positioning technologies that location can be determined
relevant information from a database. Nokia researchers
to within a few metres and absolute geographic locations
have developed a Mobile Augmented Reality Application
can be accurately established. Global Positioning System
(MARA) that is able to overlay digital information onto
(GPS) chips now provide better coverage and can be
cameraphone feeds of the real world. It uses GPS,
found in many consumer devices such as PDAs, mobile
an accelerometer, digital compass and database of
phones and even school bags [http://ubiks.net/
locations [http://research.nokia.com/research/
local/blog/jmt/archives3/2004/10/index.php]. GPS
projects/mara/index.html].
can be coupled with navigation and personal locator
services (likely to appear in UK in 2007 according to ABI Japanese mobile phone networks offer a similar system
jsp?pressid=766]). An alternative European satellite to point their devices at buildings or other locations
should provide greater reliability and accuracy that place. A variety of innovative uses from mapping,
tourist information, local search, mobile commerce,
Proximity devices like RFID chips rely on a user or device
entertainment/shopping guides and advertising are
coming near to them before an event is triggered. This
envisaged [http://www.geovector.com/appdemos/].
69
6
Motes/smart dust Context awareness
A development of sensor networks variously known One of the main goals of ubiquitous computing is to
as motes, smart dust, and speckles, involves extremely provide relevant information, in the right form, at the
small sensor nodes, potentially the size of a grain of time and place it is needed. If objects and devices
rice. These ‘smart dust’ networks are very robust can recognise you and know about their location and
and can be scattered or sprayed into an environment environment and automatically discover other devices
or on an object. These systems are still very much and resources (multi-sensorality), then the potential
in development, but are being researched by various for delivering the appropriate, ‘just in time’ information
organisations around the world [http://www.specknet. increases. Learning systems would be able to adapt
org/publications/Steven4_ICSE04.pdf]. their output based on a range of unique characteristics.
This is key to customised and personalised information
Connectivity
systems that remain invisible until needed.
Wireless connectivity is key to enabling ubiquitous
Already, our attention is being taken up by streams of
computing, but the increasing range of technologies is
often unmediated information. Context- aware systems
beyond the scope of this article. You can keep up with
should help filter information and make IT work for us
developments in wireless technologies through Becta’s
without us having to actively interrogate systems. This
TechNews www.becta.org.uk/technews.
allows learners to concentrate on the task rather then
the technology.
Potential for learning
In education the ability to receive and manipulate real- Intelligent agents
time data and interact with objects and devices in the
Intelligent agents are proactive, autonomous, software
real world has a range of benefits. Science, for example,
tools and systems that can determine appropriate
involves measuring the world, analysing data and testing
actions based on a range of data from multiple sources.
hypotheses. By accessing sensors embedded in the
Often they can ‘learn’ from experience. They enable
environment, learners have the opportunity to conduct
systems to become ‘aware’ and respond intelligently to
their own investigations, develop analytical/critical
events. Sometimes this will mean informing or alerting
thinking skills and model concepts. The Coastal Ocean
a human user, but in other cases the system will make
Observation Laboratory based at Rutgers University
decisions. These systems may respond to environmental
(USA) can be accessed online by schools enabling
data (much as the thermostat in your home controls the
learners to use and manipulate real time data collected
central heating), but for learning it means systems that
from sensors in the ocean [www.coolclassroom.
know who you are, what your preferences and learning
org/home.html]. In this experiential learning learners
styles are, where you are, what device you are using and
have the opportunity to use exactly the same data as
what you are doing. This allows systems to become much
professional researchers. This is part of what Bruner calls
more human/learner centred. [http://agents.umbc.edu/].
‘learning to be’11 rather than ‘learning about’.
13 Mahesh S. Raisinghani*, Ally Benoit, Jianchun Ding, Maria Gomez, Kanak Gupta, Victor Gusila, Daniel Power and Oliver
Schmedding, Ambient Intelligence: Changing Forms of Human-Computer Interaction and their Social Implications Journal of
Digital Information, Volume 5 Issue 4 Article No. 271, 2004-08-24 http://jodi.ecs.soton.ac.uk/Articles/v05/i04/Raisinghani/ 73
6
Source: http://www.hp.com/halo
…I can envision a future in which robotic devices will which data they wish to obtain from the facility and
become a nearly ubiquitous part of our day-to-day to generate information in support of their learning
lives. I believe that technologies such as distributed programme. This could be extended to many other
computing, voice and visual recognition, and wireless areas of the curriculum, by looking at the real world
broadband connectivity will open the door to a science used across a range of industries.
new generation of autonomous devices that enable An evaluation of the Bradford Robotic Telescope, Smith,
computers to perform tasks in the physical world on P., Hoshin, 2006 [http://www.telescope.org/articles/
our behalf. We may be on the verge of a new era, YFRobotics.pdf].
when the PC will get up off the desktop and allow us
to see, hear, touch and manipulate objects in places
where we are not physically present.
Bill Gates, A Robot in Every Home, Scientific Information/data handling
American, January 2007 The power of the network increases exponentially by
These sorts of technologies are already being used the number of computers connected to it. Therefore,
in scientific and military work and for consultations or every computer added to the network both uses it as a
surgery carried out remotely. resource while adding resources in a spiral of increasing
value and choice.
For education the potential of these technologies is
huge. They can allow learners to experience, explore Bob Metcalfe15
and interact with remote locations, foreign countries and The real world network of data will allow humans to be
inhospitable/inaccessible or environmentally sensitive better informed and make better decisions, but it will
places. Some simple, educational projects already exist. also mean that machines can make better decisions
For example, the MIT iLab14 allows students to conduct too. However, the vast amounts of data about people,
experiments remotely over the internet. The Bradford things and the environment that a ubiquitous computing
robotic telescope allows learners to request images world would generate will require new ways of handling,
from a professional space telescope located in Tenerife searching and presenting information.
[http://www.telescope.org/]. An evaluation of the Firstly, we will need new applications to take advantage
project found that it was: of the range of real-time data being collected. Something
…a new type of learning website supported by a similar to this can be seen in business intelligence
real world facility which provides real time access to applications that provide constantly updated sales
operational data to support learning programmes. figures, trends and performance measurements to
The learner has a degree of freedom to define managers’ desktops. In education learners will be able
Systems will increasingly be able to respond to data The ability for machines and systems to interrogate
coming from the real world and take appropriate action other machines and systems and share information
without human intervention. Increasingly computers will will be key to enabling the ubiquitous computing
be making decisions on our behalf, only presenting data vision. The development of a semantic web is
and information once it has been analysed and filtered to one suggested solution. The semantic web uses
be appropriate to our needs. This is part of a shift towards ontologies and schemas to separate data from
using computer intelligence ‘on demand’ and being how it is presented (unlike HTML) and give it a
presented with useful information rather than just data. structure that enables information on the web to
Secondly, we would need new architectures and data be retrieved, interpreted and shared by machines/
structures (scaleable and adaptable) to cope with intelligent agents rather than just humans. [http://
the enormous processing and storage requirements www.w3.org/2001/sw/]
of the ubiquitous world. This is likely to involve large For an exploration of potential uses of the semantic
scale networks using commodity technology to create web in education see http://www-jime.open.ac.uk
massive, resilient information networks with in built /2004/1/.
redundancy. Currently, the closest example of this is the
server farms employed by search companies such as
Google. Here commodity servers are used to carry out
massive parallel processing of data. However, this is a
highly centralised model; increasingly with ubiquitous
computing the intelligence is more distributed and moves
to the edge of the network. Conceivably, connected
devices and objects with embedded processors could
become part of a massive distributed computer.
More intelligent ways of managing (data warehousing),
searching (data mining), retrieving (knowledge discovery)
and presenting data are developing to cope with the
vast quantities of digital information stored and available
in real time. Displaying information so that it can be
interpreted intuitively will be important to making use
of the data. New knowledge presentation techniques
such as visual representations (and 3D) rather than text
and figures are likely to be increasingly important. There
is already a shift towards larger and multiple displays to
improve productivity.
75
6
Issues
Some commentators believe that ubiquitous computing The problem, while often couched in terms of privacy,
is too complex to be achievable and that even if the is really one of control. If the computational system is
technology worked, we would not be able to cope with invisible as well as extensive, it becomes hard to know
the amount of data produced. There are also many what is controlling what, what is connected to what,
technical issues to overcome such as the reliability where information is flowing, how it is being used, what is
and dependability of systems. Other areas needing broken (vs what is working correctly, but not helpfully), and
development include hardware, interfaces, system what are the consequences of any given action (including
simply walking into a room).
architectures, standards for interoperability and battery life.
Weiser, M., Gold, R., Brown, J.S., The origins of
There are also genuine concerns about invasion of
ubiquitous computing research at PARC in the late
privacy, trust and the security of systems. Already, some
1980s [http://www.research.ibm.com/journal/
RFID schemes have been halted in schools [http://
sj/384/weiser.html].
networks.silicon.com/lans/0,39024663,39127946,
00.htm] and the commercial sector because of public Finally, there are questions over the social impact and
desirability of such pervasive technologies. Potentially
concerns [http://www.theregister.co.uk/2004/03/01/
ubiquitous computing technologies could, among other
german_revolt_against_rfid/]. RFID enabled passports
benefits, help tackle the digital divide, address issues of
have been shown to be insecure [http://www.fidis.net/
an ageing population and encourage life-long learning.
press-events/press-releases/budapest-declaration/].
However, many benefits may be more trivial or marginal
Ubiquitous computing is more invasive and persistent and need to be set against the financial and privacy
than for example, the internet. It would often work costs of developing such an infrastructure. We need to
without any explicit user action and generate a great separate the desirable from the possible.
deal of information about a user’s location and actions.
It has been suggested that we may need to move to a
new idea of ‘privacy’. This would involve acceptance
that a great deal of information is collected about us, but
concentrate on maintaining control of who has access to
that information and for what purposes it can be used.
Even now, people can be tracked through their mobile
phones, credit/loyalty cards, and CCTV, but the
convenience and benefits of these technologies are
often seen as outweighing the concerns. This may not
always be the case and policies and protections need
to be put in place, especially when dealing with
information about learners.
76
6
Conclusion
The original vision of ubiquitous computing, with an to systems. These technologies are likely to develop
extensive real world web of networked objects and rapidly over the next five years and will see a number
devices may take at least 10-15 years to come close of elements of ubiquitous computing being actively and
to being realised. Indeed, it is unclear whether we will usefully adopted. Moreover, many of the possible uses
ever reach a situation where widespread intelligent, of these technologies cannot be imagined today. Over
embedded technologies operate seamlessly in the time these developments will increasingly enable more
environment around us. However, even if this vision is immediate, personalised, experiential and context-based
never achieved, processing, identity, connectivity and learning where natural interactions take place between
sensing are already being added to an increasing number people, systems, places and objects.
of objects, locations and devices. These are beginning Mobile learning16 takes computers out of the classroom
to allow new interactions and ways of interfacing with into the world; with ubiquitous computing the world
computer systems, as well as adding new intelligence becomes the classroom and the computer.
16 for an exploration of the benefits of mobile learning see Geoff Stead’s article in Emerging technologies for learning (Becta, 2006) 77
6
References and further reading
2006 Horizon Report The New Media Consortium and the EDUCAUSE Learning Initiative,
The New Media Consortium 2006
Ambient inteliigence.org, site developed by Giuseppe Riva, Ph.D. within the work of the VEPSY research project (IST-
2000-25323) funded by the European Union http://www.ambientintelligence.org/
ISC Technology and Standards Watch report on The Computer Journal Lecture for the British Computer Society:
Ubiquitous computing: shall we understand it? Presented by Professor Robin Milner, University of Cambridge, 23
February 2006.
Cooperstock, Jeremy R., Intelligent Classrooms need Intelligent Interfaces: How to build a high-tech teaching
environment that teachers can use, Centre for Intelligent Machines, McGill University
Denziger, J., Some Thoughts on Future IST from a Designer’s Perspective Designing Ubiquitous Computing,
Frankfurt/Main, Germany
Da Costa, O., (Institute for Prospective Technology Studies IPTS), Final report of the JRC-IPTS/ESTO project Ambient
Intelligence in Everyday Life Roadmap, submitted for approval to the Executive Committee of the European Science
and Technology Observatory (ESTO) in August 2003.
Goerlich, J. Wolfgang, InTouch RP-6 Medical Telepresence Robot, Go Robotics, February 2006
http://www.gorobotics.net/The-News/Latest-News/InTouch-RP%116-Medical-Telepresence-Robot/
ISTAG, Information Society Technologies Advisory Group, Advisory Group to the European Community’s Information
Society Technology Program http://www.cordis.lu/ist/istag.htm
Lawlor, M., Collaborative Technologies Demand Deep Change, Signal Magazine AFCEA’s international Journal,
May 2006
Ogata, H., Yano, Y., Context-Aware Support for Computer-Supported Ubiquitous Learning Dept. of Information
Science and Intelligent Systems, Tokushima University Paper at 2nd IEEE International Workshop on Wireless and
Mobile Technologies in Education (WMTE’04)
Raisinghani, M., Benoit, A., Ding, J., Gomez, M., Gupta, K., Gusila, V., Power, D., Schmedding, O., Ambient
Intelligence: Changing Forms of Human-Computer Interaction and their Social Implications, Journal of Digital
Information, Volume 5 Issue 4 Article No. 271,2004
78
6
Pervasive Computing Net: www.pervasivecomputing.net
Rogers, Yvonne and Sara Price. Extending and Augmenting Scientific Enquiry through Pervasive Learning
Environments. Children, Youth and Environments 14(2): 67-83 2004 from http://www.colorado.edu/journals/cye/
Sakamura, K. Koshizuka, N., Ubiquitous Computing Technologies for Ubiquitous Learning, YRP Ubiquitous
Networking Lab., Tokyo Univ., Japan, Appeared in Wireless and Mobile Technologies in Education, 2005. WMTE
2005. IEEE International Workshop on 28-30 Nov. 2005
Stankovic, John A. Lee, Insup, Mok, Aloysius,Opportunities and Obligations for Physical Computing Systems,
IEEE 2005
Tinker,R., Banasch, S., Draft: SmartProbes Concept Paper, The Concord Consortium
Ward, M., Van Kranenburg, R., Backhouse, G., RFID: Frequency, standards, adoption and innovation JISC
TechWatch, 2006
Weiser, M., Brown, J. Seely, The coming of age of calm technology, Xerox PARC October 5, 1996
79