Computing In Ubiquitous Computing

784 Words4 Pages
Power Supply In ubiquitous computing applications supplying power to electronic systems are vital. Progress in chip technologies and electronics development have been advantageous to any user. The advantages ranged from decreased system size, improvement in performance, and reduced specific power demands. For most applications supplying power is not a problem once the application is plugged into a power grid and networked with cables. With an increase in demand for mobile and wireless systems with power self-sufficiency there has been a lot of power consumption forcing the user to recharge or change the battery frequently. This has led to the progression of IC manufacturing which had a goal of eliminating the use of batteries altogether. Sensor…show more content…
The fundamental vision for ubiquitous computing is the possibility for objects to communicate. The Institute of Electrical and Electronics Engineers (IEEE) has published a number of different standards for wireless networks. The decisive players in the ICT field are the major mobile telephone providers, makers of network components and suppliers of digital devices. These companies are working hand in hand with representatives of the standards organizations in order to develop complete solutions for information and communication. Communication technology is recognized as the key driver for ubiquitous computing, but even with this title they are faced with technological…show more content…
Geographic locations has its limitations because some services are location-based and for these services to be accessed by the user, the use of the appropriate localization technology is very important. There are currently three types of localization systems: satellite-supported, cellular-supported and indoor localization systems. A satellite-based global positioning system (GPS) - is the most widely used localizations and navigation system, that was implemented the United States Department of Defence for the military and has been used worldwide since 1998. Cell ID identifies the base station to which a mobile telephone has established a connection, and thereby determines the location of the mobile user. The position of a mobile telephone may be determined in some circumstances, through a process known as triangulation. Improving localization techniques means increasing precision and sizing down the equipment. This is now a primary focus. Security Technology With ubiquitous computing most communication is wireless and nearly all smart objects can exchange information, thus making security important. Ubiquitous computing applications are implemented in various aspect of our everyday life, thus making a user unaware that they may be using such application. Thus, safety is very important. A further security requirement in ubiquitous computing is data protection to
Open Document