From Wireless to Ubiquitous Computing

70
From Wireless to Ubiquitous Communication and the Path Ahead 4 October 2010 Arijit Ukil Scientist R&D Innovation Labs Tata Consultancy Services, Kolkata, India

Transcript of From Wireless to Ubiquitous Computing

Page 1: From Wireless to Ubiquitous Computing

From Wireless to Ubiquitous

Communication and the Path

Ahead

4 October 2010

Arijit UkilScientist R&D

Innovation Labs

Tata Consultancy Services, Kolkata, India

Page 2: From Wireless to Ubiquitous Computing

Talk Outline

1. 4G Wireless Communication Issues, Challenges Trends and

Architecture

2. Wireless Channel Dynamics

3. Advanced Multiple Access Scheme : OFDMA

4. Multi-user Diversity and Spectral Efficiency

5. Link adaptation

6. Cross-layer Optimization: Scheduling and Resource Allocation

4 October 2010

6. Cross-layer Optimization: Scheduling and Resource Allocation

7. QoS

8. Game Theory in Wireless Network Optimization

9. SDR

10. NEMO

11. Ubiquitous Computing and Communication

12. Home Gateway

Page 3: From Wireless to Ubiquitous Computing

Wireless Networks

4 October 2010

Page 4: From Wireless to Ubiquitous Computing

Future Wireless Networks

Wireless Internet access

Nth generation Cellular

Wireless Ad Hoc

Networks

Sensor Networks

Wireless Entertainment

Smart Homes/Spaces

Automated Highways

4 October 2010

Automated Highways

All this and more…

Page 5: From Wireless to Ubiquitous Computing

Future of Wireless Communications

�Ubiquitous Communication Among People and Devices

�Wireless Internet access

�Nth generation Cellular

�Wireless Ad Hoc Networks

�Sensor Networks

4 October 2010

�Sensor Networks

�Wireless Entertainment

�Smart Homes/Spaces

�Automated Highways

Page 6: From Wireless to Ubiquitous Computing

Vision of Future Wireless Communications

�Anytime, anywhere computing

�Enhanced communications

�Always-on : network access for users on the move

�Support of Heterogeneity

�Minimum user interface

4 October 2010

�Minimum user interface

Page 7: From Wireless to Ubiquitous Computing

We Want More

Apart from Voice Traffic The applications require high data rate Apart from Voice Traffic The applications require high data rate

4 October 2010

Apart from Voice Traffic The applications require high data rate Apart from Voice Traffic The applications require high data rate

and variable and variable QoSQoS

> > e-mail

> multimedia messaging

> Internet browsing

> video conferencing

> audio and video streaming

> e-commerce

> mobile TV

Page 8: From Wireless to Ubiquitous Computing

Targets of LTE

• Peak data rate

• 100 Mbps DL/ 50 Mbps UL

•Mobility

• Optimized for 0 ~ 15 km/h.

• 15 ~ 120 km/h supported with high performance

• Supported up to 350 km/h or even up to 500 km/h.

•Coverage

4 October 2010

•Coverage

• Performance should be met for 5 km cells with slight degradation for 30 km cells.

•Spectrum flexibility

• 1.25 ~ 20 MHz

•2X2 MIMO

Page 9: From Wireless to Ubiquitous Computing

Design Consideration of 4G

4 October 2010

Page 10: From Wireless to Ubiquitous Computing

Challengessss

��Limited Resources : Limited Resources : CapacityCapacity--limited mediumlimited medium

��Traffic patterns, user locations, constantly changing network Traffic patterns, user locations, constantly changing network conditionsconditions

��Heterogeneous trafficHeterogeneous traffic

��Hard Hard QoSQoS constraintsconstraints

��Maximize number of usersMaximize number of users

4 October 2010

��Maximize number of usersMaximize number of users

��Maximize network coverage Maximize network coverage

��Minimize outage probabilityMinimize outage probability

��Guaranteed user satisfactionGuaranteed user satisfaction

Page 11: From Wireless to Ubiquitous Computing

Limiting Factors in Mobile Wireless

Communications

••NoiseNoise

••SNRSNR

••Multipath fadingMultipath fading

••InterferenceInterference

4 October 2010

••InterferenceInterference

••Limited PowerLimited Power

••Frequency selective fadingFrequency selective fading

••Doppler shiftDoppler shift

Page 12: From Wireless to Ubiquitous Computing

Solution

Robust Multiplexing and Multiple Access Technique : Robust Multiplexing and Multiple Access Technique :

OFDM/OFDMAOFDM/OFDMA

Intelligent user allocation : Intelligent user allocation : Dynamic Resource Allocation and Dynamic Resource Allocation and

Packet SchedulingPacket Scheduling

Integrated Optimization:Integrated Optimization: Cross Layer OptimizationCross Layer Optimization

Link Adaptation : Link Adaptation : Adaptive Modulation and CodingAdaptive Modulation and Coding

4 October 2010

Link Adaptation : Link Adaptation : Adaptive Modulation and CodingAdaptive Modulation and Coding

Spatial Multiplexing: Spatial Multiplexing: MIMOMIMO

Performance Optimization:Performance Optimization: CrossCross--layer Designlayer Design

Page 13: From Wireless to Ubiquitous Computing

Generic Wireless Communication System

Model

4 October 2010

Page 14: From Wireless to Ubiquitous Computing

The OSI Model

4 October 2010

Page 15: From Wireless to Ubiquitous Computing

OSI model: Header Based Data Networks

4 October 2010

Page 16: From Wireless to Ubiquitous Computing

Channel Dynamics

4 October 2010

��Wireless Channel is timeWireless Channel is time--varying and frequencyvarying and frequency--selectiveselective

��Multipath fading provides high peaks to exploitMultipath fading provides high peaks to exploit

��Channel capacity is achieved by such an opportunistic strategy Channel capacity is achieved by such an opportunistic strategy

��Channel varies faster and has more dynamic range in mobile Channel varies faster and has more dynamic range in mobile

environmentsenvironments

��More appropriate for data with More appropriate for data with soft latencysoft latency requirementsrequirements

Page 17: From Wireless to Ubiquitous Computing

Attenuation, Dispersion Effects: ISI

4 October 2010

Inter-symbol interference (ISI)

Page 18: From Wireless to Ubiquitous Computing

Mobility vs SNR Dynamic Range

prediction

t

prediction

SINR

t

SINR

prediction

t

SINR

conservative

4 October 2010

lag

(a)

lag

(b)

lag

(c)

3 km/hr 30 km/hr 120 km/hr

Can only predict the average of the channel fluctuations,

not the instantaneous values

Page 19: From Wireless to Ubiquitous Computing

Multipath

Received Power

Delay Spread t

4 October 2010

Delay Spread

dB With Respect to RMS Value

0 0.5

0.5λλλλ

1.5

-30-20-10

100

1t, in seconds

0 10 3020x, in wavelength

h(t) = aiejθθθθi δ(t-ti)Σ

Page 20: From Wireless to Ubiquitous Computing

Link Adaptation

Adjust the transmit parameters according to the user’s channel

characteristics

Higher order modulation and error control coding when

channel is good Adaptive Modulation and

Coding (AMC)

4 October 2010

Page 21: From Wireless to Ubiquitous Computing

Opportunistic Communication in Multi-

Carrier Systems

Mobile

User 1

Fading channel

4 October 2010

User M

Page 22: From Wireless to Ubiquitous Computing

Benefit of Multi-user Diversity

4 October 2010

Multiuser diversity provides a system-wide benefit.

Challenge is to share the benefit among the users in a fair

way

Page 23: From Wireless to Ubiquitous Computing

Multiple Access

4 October 2010

Page 24: From Wireless to Ubiquitous Computing

Resource Allocation in Wireless Systems

•High data rate transmission

– Wireless local area networks (WLAN) 54 -- 108 Mbps

– Metropolitan area networks (WiMAX) ~10 -- 100 Mbps

– Cellular systems (3GPP) ~1 -- 4 Mbps

•Limited resources shared by multiple users

– Transmit power

– Frequency bandwidthfrequency

4 October 2010

– Frequency bandwidth

– Transmission time

– Code resource

– Spatial antennas

•Resource allocation impacts

– Power consumption

– User throughput

– System latency

user 4 user 5 user 6

user 1 user 2 user 3

time

code/s

patia

l

Page 25: From Wireless to Ubiquitous Computing

Scheduling

��Resource sharing always results in contentionResource sharing always results in contention

��A scheduling discipline resolves contention A scheduling discipline resolves contention

��Key to scheduling is to fairly share resources and to provide Key to scheduling is to fairly share resources and to provide

performance guaranteesperformance guarantees

��A scheduling discipline does two things:A scheduling discipline does two things:

��decides service orderdecides service order

4 October 2010

��decides service orderdecides service order

��manages queue of service requestsmanages queue of service requests

��Where? Where?

��Anywhere where contention may occurAnywhere where contention may occur

��At every layer of protocol stackAt every layer of protocol stack

��Usually at network or MAC layerUsually at network or MAC layer

Page 26: From Wireless to Ubiquitous Computing

Introduction to QoS

QoS is the well defined and controllable behavior of a

system with respect to quantitative parameters.

�Generic parameters:

�Bandwidth

�Delay

�Jitter

4 October 2010

�Jitter

�Packet loss rate (or loss probability)

�Transport/Application-specific parameters:

�Timeouts

�Percentage of “important” packets lost

Page 27: From Wireless to Ubiquitous Computing

QoS Service Classes

QoS service classes define the priority of the users.

4 October 2010

Page 28: From Wireless to Ubiquitous Computing

Cross-layer Design: New Paradigm

�Application

�Network

�Access

�Link

�MAC

DiversityDiversity

AdaptivityAdaptivity

SchedulingScheduling

EndEnd--toto--End MetricsEnd Metrics

4 October 2010

�MAC

�Hardware

EndEnd--toto--End MetricsEnd Metrics

Substantial gains in throughput, efficiency, and QoS can be achieved with cross-layer adaptation

Page 29: From Wireless to Ubiquitous Computing

Game Theory in Wireless Communication

�Game theory is the study of the interaction of autonomous

agents.

�Game Theory is the best known tool to analysis the behavior

of distributed systems where the entities can be co-operative

or non co-operative and the system does not have any

centralized controller. e.g. ad hoc networks

4 October 2010

centralized controller. e.g. ad hoc networks

�An ad hoc network is a self-configuring, multihop network in

which there is no central authority. Thus, every aspect of the

configuration and operation of an ad hoc network must be

completely distributed.

Page 30: From Wireless to Ubiquitous Computing

Where to use Game Theory?

� Power Control : In CDMA systems, When a player increases

his power level, this will increase his own SINR, but will

decrease the SINRs of all other players.

� Routing: Routing Decision of one node affects the decision of

other node.

� Resource allocation and scheduling: If every user wants to

4 October 2010

� Resource allocation and scheduling: If every user wants to

maximize its own pay-off , totally unfair system, stability will

be severely hamper.

�Inter-cell Interference Management: Increasing the

transmit power of one cell increases interference of

neighborhood cells.

Page 31: From Wireless to Ubiquitous Computing

Software Defined Radio (SDR)

�The term software defined radio (SDR) refers to reconfigurable or

reprogrammable radios that can show different functionality with the

same hardware.

�The functionality is defined in software, a new technology can easily be

implemented in a software radio with a software upgrade.

�In a SDR, multiple waveforms can be implemented in software, using the

same hardware.

4 October 2010

same hardware.

�SDR provides software control of variety of modulations, FEC, interference

management and capacity enhancement techniques over a broad

frequency spectrum (wide and narrow band), while ensuring secure

communication management.

Page 32: From Wireless to Ubiquitous Computing

Software Defined Radio Configuration

4 October 2010

Page 33: From Wireless to Ubiquitous Computing

Network Mobility (NeMO)

�Network mobility (NeMO) management concerns with the

mobility management of an entire wireless mobile network to

provide uninterrupted network connectivity to many mobile

devices moving together in the mobile network.

�Most of the 3G and entire 4G and beyond wireless

communication technology is all-IP.

�This growing use of IP devices in portable applications has

4 October 2010

�This growing use of IP devices in portable applications has

created the demand for mobility support for entire networks

of IP devices.

� NeMO solves this problem by extending Mobile IP.

Page 34: From Wireless to Ubiquitous Computing

Contd…

4 October 2010

Page 35: From Wireless to Ubiquitous Computing

Contd…

MIPv6 NeMO

4 October 2010

Page 36: From Wireless to Ubiquitous Computing

Ubiquitous Computing

4 October 2010

Ubiquitous Computing

Page 37: From Wireless to Ubiquitous Computing

Ubiquitous Computing

�What Ubiquitous Computing is

�Computing is so profound to disappear into background

of our lives

�What Ubiquitous Computing isn’t

�virtual reality

�Difference

4 October 2010

�Difference

�virtual reality puts people inside a computer-generated

world

�ubiquitous computing forces the computer to live out

here in the world with people

Page 38: From Wireless to Ubiquitous Computing

The Trends in Computing Technology

1970s

1990s

4 October 2010

Late 1990s

Now and Tomorrow ?

Page 39: From Wireless to Ubiquitous Computing

Ubiquitous Computing Era

4 October 2010

Page 40: From Wireless to Ubiquitous Computing

Broad Concepts that Come from our

Assumptions

•• Ubiquitous computing and Ubiquitous computing and

communication connect people communication connect people

to information that exists to information that exists

everywhere.everywhere.

•• Computing is everywhere.Computing is everywhere.

4 October 2010

•• Computing is everywhere.Computing is everywhere.

•• Sensors and actuators are Sensors and actuators are

everywhere.everywhere.

•• Smart applications proSmart applications pro--actively actively

deliver services and deliver services and

information.information.

Page 41: From Wireless to Ubiquitous Computing

Ubiquitous Computing

Mark Weiser, Xerox PARC 1988

“Ubiquitous computing enhances computer “Ubiquitous computing enhances computer

4 October 2010

“Ubiquitous computing enhances computer “Ubiquitous computing enhances computer

use by making many computers available use by making many computers available

throughout the physical environment, but throughout the physical environment, but

making them effectively invisible to the user”making them effectively invisible to the user”

Page 42: From Wireless to Ubiquitous Computing

A Good Technology Is Invisible

• “Invisible” stays out of the way of itself

– Like a good pencil stays out of the way of the writing

– Like a good car stays out of the way of the driving

• Bad technology draws attention to itself, not task

– Like a broken, or skipping, or dull pencil

4 October 2010

– Like a car that needs a tune-up

• Computers are mostly not invisible

– They dominate interaction with them

• Ubiquitous computing is about “invisible computers”

Page 43: From Wireless to Ubiquitous Computing

The Building Blocks

Sensors/Actuators

Context-AwarenessDigital Memories

4 October 2010

Social ComputingContinuous Computing

Page 44: From Wireless to Ubiquitous Computing

Sensors/Actuators

Context-AwarenessDigital Memories

Sensors/Actuators

4 October 2010

Social ComputingContinuous Computing

Page 45: From Wireless to Ubiquitous Computing

Sensors and Actuators

•Pervasive, online and integrated.

•Sensors inform applications and services,

providing context.

•Actuators allow intelligent applications to

control the environment.

4 October 2010

Page 46: From Wireless to Ubiquitous Computing

Context Awareness

Digital Memories

Sensors/Actuators

Context-Awareness

4 October 2010

Social ComputingContinuous Computing

Context-Awareness

Page 47: From Wireless to Ubiquitous Computing

Context Awareness

Systems “aware” of, and respond to, their context (situation, Systems “aware” of, and respond to, their context (situation,

environment)environment)

�� Logical contextLogical context

InterestsInterests

�� Physical contextPhysical context

�� locationlocation

4 October 2010

�� InterestsInterests

�� user preferencesuser preferences

�� locationlocation

�� orientationorientation

�� date and timedate and time

�� temperaturetemperature

�� humidityhumidity

�� device capabilitiesdevice capabilities

�� Derived/inferred contextDerived/inferred context

�� HistoryHistory

�� ActivityActivity

Page 48: From Wireless to Ubiquitous Computing

General Mechanism for Context Awareness

1. Collect information on the user's physical, informational or

emotional state.

2. Analyze the information, either by treating it as an

independent variable or by combining it with other

4 October 2010

information collected in the past or present.

3. Perform some action based on the analysis.

4. Repeat from Step 1, with some adaptation based on

previous iterations.

Page 49: From Wireless to Ubiquitous Computing

Social Computing

Context-AwarenessDigital Memories

Sensors/Actuators

4 October 2010

Continuous Computing

Social Computing

Page 50: From Wireless to Ubiquitous Computing

Social Computing

4 October 2010

Page 51: From Wireless to Ubiquitous Computing

Continuous Computing

Context-AwarenessDigital Memories

Sensors/Actuators

4 October 2010

Social ComputingContinuous Computing

Page 52: From Wireless to Ubiquitous Computing

Continuous Computing is…

••Pervasive networksPervasive networks

••Smart spacesSmart spaces

••Mobile devicesMobile devices

••Advanced application servicesAdvanced application services

4 October 2010

••Advanced application servicesAdvanced application services

WS

Page 53: From Wireless to Ubiquitous Computing

Next Generation Smart Spaces

Better human Better human

computer computer

4 October 2010

Oxygen, MIT Media Lab

computer computer

interactioninteraction

Page 54: From Wireless to Ubiquitous Computing

This…

4 October 2010

Page 55: From Wireless to Ubiquitous Computing

Will become this

4 October 2010

Page 56: From Wireless to Ubiquitous Computing

Eventually, living in a world of continuous computing will be Eventually, living in a world of continuous computing will be

like wearing eyeglasses: the rims are always visible, but the like wearing eyeglasses: the rims are always visible, but the

wearer forgets she has them onwearer forgets she has them on——even though they’re the only even though they’re the only

things making the world clearthings making the world clear

4 October 2010

Page 57: From Wireless to Ubiquitous Computing

Intelligent Environment

4 October 2010

Page 58: From Wireless to Ubiquitous Computing

Ubiquitous Computing Projects

•Aura project Carnegie Mellon Univ.

– Distraction-free ubiquitous computing

•Endeavour Univ. of California at Berkeley

•Oxygen MIT

•Portolano The Univ. of Washington

– Infrastructure based on mobile agents, data-centric routing

4 October 2010

routing

•Sentient Computing AT&T lab.

•Cooltown HP

– Extending Web technology, wireless networks, and portable devices

•EasyLiving Microsoft Research

•WebSphere Everyplace IBM

– Application and middleware to develop application in business level

Page 59: From Wireless to Ubiquitous Computing

An interconnected system

opens doors

incoming call

generates TAN

updates location

4 October 2010

any weather service

school closingsacoustic alerts

time, location

alert, events

address book

Page 60: From Wireless to Ubiquitous Computing

TCS

Home Gateway Initiative

4 October 2010

Home Gateway Initiative

Page 61: From Wireless to Ubiquitous Computing

Home Networking

• Lots of companies producing WiFi gateways

– Growing market worldwide

– Prices falling rapidly

– Technology changing rapidly

• Consumer electronics companies WiFi enabling devices

4 October 2010

Page 62: From Wireless to Ubiquitous Computing

Home Gateway

�Home Gateway (HG) is an intelligent broadband or

networking interface device designed to act as a hub for

homes and small offices.

�All HGs should have the common characteristics that any in-

home device must be able to communicate with the Access

network except for the hybrid mode architecture.

4 October 2010

network except for the hybrid mode architecture.

�Any in-home device must be able to communicate with any

other in-home device without the traffic going via the access

network for security, privacy, performance and charging

reasons.

Page 63: From Wireless to Ubiquitous Computing

Home Gateway

Home Gateway

intern

et

4 October 2010

Page 64: From Wireless to Ubiquitous Computing

Home Gateway Architecture

4 October 2010

Page 65: From Wireless to Ubiquitous Computing

TCS Home Gateway Initiative

• TCS has come up with a home infotainment platform (HIP) –an embedded platform for Internet access on TV from home.

• TCS has plans to extend this device into a ubiquitous home gateway.

4 October 2010

• Like all embedded systems, such gateway device is required to store, access, or communicate date which are sensitive in nature. This makes security a serious concern.

Page 66: From Wireless to Ubiquitous Computing

The Big Question…

How will new How will new

technology impact the technology impact the

4 October 2010

technology impact the technology impact the

2121stst Century?Century?

Page 67: From Wireless to Ubiquitous Computing

Yesterday's Computers Filled Rooms …

4 October 2010

Page 68: From Wireless to Ubiquitous Computing

… So Will Tomorrow’s

4 October 2010

Page 69: From Wireless to Ubiquitous Computing

Conclusion

�Wireless Network is still evolving.

�What was laid foundation in 1873 by Clerk Maxwell, has

taken a long journey to come to this shape.

�Still immense scope of research and development activity is

going on.

�Ubiquitous computing and communication is not

4 October 2010

�Ubiquitous computing and communication is not

the end and perhaps may be the beginning of

another journey for wireless communication ,

networking and computing.

Page 70: From Wireless to Ubiquitous Computing

Thank You

4 October 2010

Thank You