Additional Topics 2008–09
Principal lecturer: Prof Andy Hopper
Taken by: Part II
Syllabus
Past exam questions
Course Details
The lectures this year are 12:00-13:00 in Lecture Theatre 2 of the CL. Note
that time of 10:00-11:00 as advertised in the reporter is incorrect (it had
to be moved due to a clash of lecturers!). The schedule is as follows:
Friday 24/04 Ubiquitous Computing (Robert Harle)
Monday 27/04 RFID (Robert Harle)
Wednesday 29/04 GPS (Alan Jones)
Friday 01/05 Location Determination Part I (Robert Harle)
Monday 04/05 Location Determination Part II (Robert Harle)
Wednesday 06/05 Cryptography (Frank Stajano)
Friday 08/05 Security for UbiComp (Frank Stajano)
Monday 11/05 Security for RFID (Frank Stajano)
Wednesday 13/05 Thin Client Computing Part I (Andy Harter)
Friday 15/05 Computing for the Future of the Planet (Andy Hopper)
Monday 18/05 Sustainable Energy (David Mackay)
Wednesday 20/05 Thin Client Computing Part II (Andy Harter)
Electronic copies of notes, links and other material will appear here as the
lectures are completed.
Lecture 1: Ubiquitous Computing
What you need to know: The ubicomp vision in 1988; Context-aware
computing; Example projects and lessons learnt (active badge, PARC, Intel Personal Server,
Wearable Computing, Sentient Computing); Ubicomp today.
Lecture Notes: PDF
Reading:
Yesterday’s tomorrows: notes on ubiquitous computing’s dominant vision. Bell
and Dourish. PDF
The Computer for the 21st Century. Weiser. PDF
A distributed Location System for the Active Office. Harter and Hopper.
PDF
The Anatomy of a Context-Aware Application. Harter, Hopper, Steggles, Ward
and Webster. PDF
The Royal Society Clifford Paterson Lecture, 1999 - Sentient
Computing. Andy
Hopper. PDF
The PARCTAB Ubiquitous Computing Experiment. Want, Schilit, Adams, Gold,
Petersen, Goldberg, Ellis and Weiser. Link.
Questions:
1A. Contrast mobile computing with ubiquitous computing. [5]
1B. It has been suggested that the Apple iPhone was the first major ubicomp
device. What are the properties of the iPhone that resulted in this
description? Discuss how well the iPhone fits the original vision for
Ubicomp. [10]
1C. Describe the "programming with space" metaphor that enabled location-aware
computing in the Sentient Computing platform. [5]
1D. The Intel Personal Server project proposed a wireless device that would
connect to public infrastructure to provide input and output. Discuss the
technical, commercial and social issues associated with such a device. [10]
1E. Weiser's original vision for ubicomp has not been met within the timescale
he suggested (20 years). Suggest why not. [8]
Lecture 2: RFID
What you need to know: Types of RFID; Active vs Passive; Properties
and applications for close-coupled, remote-coupled and long range RFID;
Principles of back-scattering; Basics of EPC; Anti-collision protocols for LR
tags; Technical, real-world issues with LR tags
Lecture Notes: PDF
Reading:
RFID Handbook. Klaus Finkenzeller Available in libraries. Some chapters online
Questions:
2A. Give two example applications for long range RFID tags. One application
should be suitable for active LR tags, the other for passive. [4]
2B. The media regularly attack the security and privacy associated
with RFID tags. And yet the banks are all turning to RFID-based contactless
payment cards. Why do they not share the same security issues?
2C. Why are longer range passive RFID tags associated with higher
frequencies of operation?
2D. Why have we yet to see automatic checkouts where we push our
trolley through the doors and have everything charged correctly? (It
is not because products don't have RFID tags at the moment - these could be added
very quickly to products, if desired).
2E. How do probabilistic anti-collision schemes work? Suggest
applications where they might be more suitable than deterministic schemes.
2F. Write out the rounds required to identify the following tags
using a binary search: {11010, 01010, 00101, 11000}
2G. An RFID system contains N tags and uses a simple ALOHA
anti-collision protocol. Tags are constrained only to transmit a packet with
a probability of p within each time period T.
(a) Write down the expected number of transmissions in time T and hence an expression
for P(k), the probability that there will be k transmissions in
time T
(b) Give an expression in terms of T for the vulnerable
period (this is the length of time during which a transmitting packet
will collide with a specific packet). What would this period be for slotted ALOHA?
(c) From these answers, compute the probability that a given tag
transmission will not collide and hence the expected throughput (number of
tags per time T).
Lecture 3: GPS
What you need to know: GPS components; Basic operating principles;
Error sources; DGPS; Selective availability; The notion of Gold codes and how
they are used.
Reading:
Recommended
Site: Here
More detailed information (including offical docs): Here
Questions:
3A. Why do GPS satellites require atomic clocks? Why doesn't it matter
that GPS handsets don't have an accurate absolute time estimate? [6]
3B. Explain the principles of D-GPS. [5]
3C. What are the important properties of Gold codes that make them
useful for GPS? How is it that a GPS signal so weak it is below the noise
threshold at the receiver is still useful?
3D. Although intended for positioning, GPS is commonly used to
accurately synchronise clocks to a global reference time. Explain how a
handset on the surface of the Earth can compute an accurate absolute time
from a GPS satellite. Estimate the timing error that might be expected at the
handset immediately after synchronization to a satellite.
Lectures 4 and 5: Location, Location, Location
What you need to know: The principles of AoA, ToA and TDOA location;
Examples systems of each; Basics of Inertial navigation; Fingerprinting.
Lecture Notes: PDF
Questions:
4A. Briefly explain why the Bluetooth inquiry (a.k.a. discovery) process takes so long
(10.24s) and why this limits its use as a proximity-based tracking system.
4B. Compare and contrast location systems that
position a mobile transmitter (e.g. the Bat system, U-TDOA) with those that position
a mobile receiver (e.g. GPS, Cricket). [6]
4C. Explain why UWB systems can achieve better positioning accuracy
than more traditional radio location systems. [5]
4D. A transmitter located at (15,20) is surrounded by synchronised
receivers: A at (0,50), B at (5,0), C at (30,30). For this setup, give the equations of the
vectors, circles or hyperbolae associated with the i) AoA ii) TOA and iii)
TDOA location techniques. Assume all measurements have no noise (and are
therefore perfect) and receivers are perfectly synchronized. [8]
4E. Imagine that your GPS signal is being jammed by an enemy
transmitter. In order to unjam it, you need to first locate the
source. Describe how you would do this. [Remember that you can't use GPS to
position your receivers!]
4F. Explain why the Ubisense system makes use of UWB radio rather
than, say, the usual 2.4GHz ISM radio band. Why do we not need to use UWB
signals when positioning outdoors?
4G. What factors might you need to take into account if you were
creating a WiFi radio map?
4H. Discuss the advantages and disadvantages of using radio
fingerprints for positioning.
4I. The Nintendo Wiimote was apparently intended to be based purely
on inertial sensors. Explain why inertial sensors alone were insufficient and
describe briefly the solution implemented by Nintendo.
4J. What do you need to specify in order to create a useful tracking
system from an inertial measurement unit?
4K. Imagine that you are tasked with designing an iPhone-like device
that must be able to position itself at all times. Discuss the solutions you
would use and the accuracies you might expect indoors and out.
Lecture 6: Cryptography
What you need to know: basics of visual cryptography; Cocaine auction;
Romantic cryptography
Lecture Notes: Here
Questions:
Exercises can be found in the notes
Lecture 7: Security for Ubiquitous Computing
What you need to know: basics of visual cryptography; Cocaine auction;
Romantic cryptography
Lecture Notes: Here
Questions:
Exercises can be found in the notes
Lecture 8: Security for RFID
What you need to know: Limitations of RFID as a secure ID mechanism;
Schemes to improve RFID security and privacy
Lecture Notes: Here
Lecture 9: Thin Client Systems Part I
What you need to know: Definition of thin client
Lecture Notes: Here
Questions:
9A. Give three advantages and three disadvantags of thin client
systems.
9B. How did advances in memory technology lead to better graphics on
computer screens in the 1980s?
9C. Describe the different roaches used to remote bitmap graphics
by VNC, X and RDP.
Lecture 10: Computing for the Future of the Planet
What you need to know: Ways in which technology might create a
sustainable future.
Lecture Notes: Coming soon
Questions:
10A. The lectures identified four ways in which computing might be
applied to sustainability issues. Describe them.
10B. Discuss three technical and three political/social challenges
to "googling space-time".
10C. Is the vision for ubicomp (many devices, always on,
interacting) fundamentally incompatible with a sustainable future? Illustrate
your answer with examples.
Lecture 11: Sustainable Energy
What you need to know: The scale of the energy crisis; Sustainable
sources of energy
Lecture Notes: You can find Professor Mackay's entire book
online: WithoutHotAir.com. The
talks section also contains the slides used in the lecture.
Questions:
11A. Discuss the extent to which modern computing technology is
responsible for the current power demands of the UK.
Lecture 12: Thin Client Systems Part II
What you need to know:
Lecture Notes: Here
Questions:
12A. In the lecture about Ubiquitous computing, a scenario involving
a user walking up to a public display and 'comandeeringing' it as an output
device was presented. Discuss how remote bitmap graphics software (such as
RDP and VNC) might act as an enabler for this application.
12B. Compare and contrast the RDP and VNC protocols. [6]
12C. A student implements a simple remote graphics protocol by
regularly snapshotting the screen image and transmitting it over the
network. Identify four optimisations that would significantly boost the
performance of this protocol.
12D. Compare RDP, VNC and X for remote graphics over i) a LAN ii) a
typical ADSL connection iii) a 3G connection.
12E. What is meant by 'cloud computing'? [4]
|