SlideShare a Scribd company logo
Download the full version of the ebook now at ebookultra.com
Wireless LANs 1st Edition Benny Bing
https://ebookultra.com/download/wireless-lans-1st-
edition-benny-bing/
Explore and download more ebook at https://ebookultra.com
Recommended digital products (PDF, EPUB, MOBI) that
you can download immediately if you are interested.
3D and HD Broadband Video Networking 1st Edition Benny
Bing
https://ebookultra.com/download/3d-and-hd-broadband-video-
networking-1st-edition-benny-bing/
ebookultra.com
Charging for Mobile All IP Telecommunications Wireless
Communications and Mobile Computing 1st Edition Yi-Bing
Lin
https://ebookultra.com/download/charging-for-mobile-all-ip-
telecommunications-wireless-communications-and-mobile-computing-1st-
edition-yi-bing-lin/
ebookultra.com
Learning Bing Maps API 1st Edition Sinani
https://ebookultra.com/download/learning-bing-maps-api-1st-edition-
sinani/
ebookultra.com
Practical Network Design Techniques A Complete Guide For
WANs and LANs Second Edition Gilbert Held
https://ebookultra.com/download/practical-network-design-techniques-a-
complete-guide-for-wans-and-lans-second-edition-gilbert-held/
ebookultra.com
Problems of number theory in mathematical competitions 1st
published, repr. Edition Hong-Bing Yu
https://ebookultra.com/download/problems-of-number-theory-in-
mathematical-competitions-1st-published-repr-edition-hong-bing-yu/
ebookultra.com
Physics of Continuous Matter Exotic and Everyday Phenomena
in the Macroscopic World 1st Edition Benny Lautrup
https://ebookultra.com/download/physics-of-continuous-matter-exotic-
and-everyday-phenomena-in-the-macroscopic-world-1st-edition-benny-
lautrup/
ebookultra.com
Wireless Security 1st Edition Merritt Maxim
https://ebookultra.com/download/wireless-security-1st-edition-merritt-
maxim/
ebookultra.com
Wireless Data Demystified 1st Edition John Vacca
https://ebookultra.com/download/wireless-data-demystified-1st-edition-
john-vacca/
ebookultra.com
Hacking Wireless Networks 1st Edition Andreas Kolokithas
https://ebookultra.com/download/hacking-wireless-networks-1st-edition-
andreas-kolokithas/
ebookultra.com
Wireless LANs 1st Edition Benny Bing 2024 scribd download
Wireless LANs 1st Edition Benny Bing Digital Instant
Download
Author(s): Benny Bing
ISBN(s): 9789812799562, 9812799567
Edition: 1st
File Details: PDF, 15.69 MB
Year: 2002
Language: english
INTERNET
IEEE International Conference on
Wireless LANs and
Home Networks
WirelessLANsandHomeNetworks
Connecting Offices and Homes
Wireless LANs 1st Edition Benny Bing 2024 scribd download
WirelessLANsandHomeNetworks
Connecting Offices and Homes
Proceedings of the International Conference on
Wireless LANs and Home Networks
Singapore 5-7 December 2001
Editor
Benny Bing
Georgia Institute of Technology, USA
Technical Co-Sponsors
IEEE Communications Society
V f e World Scientific
WW NewJersey London'Singapore*
NewJersey •London • Singapore •Hong Kong
Published by
World Scientific Publishing Co. Pte. Ltd.
P O Box 128, Farrer Road, Singapore 912805
USA office: Suite IB, 1060 Main Street, River Edge, NJ 07661
UK office: 57 Shelton Street, Covent Garden, London WC2H 9HE
British Library Cataloguing-in-Publication Data
A catalogue record for this book is available from the British Library.
Cover design: Illustrates the importance of wireless LANs in the mobile Internet infrastructure.
IEEE International Conference on
WIRELESS LANS AND HOME NETWORKS
Copyright © 2001 by World Scientific Publishing Co. Pte. Ltd.
All rights reserved. This book, or parts thereof, may not be reproduced in anyform or by any means,
electronic or mechanical, includingphotocopying, recording or any information storage and retrieval
system now known or to be invented, without written permission from the Publisher.
For photocopying of material in this volume, please pay a copying fee through the Copyright
Clearance Center, Inc., 222 Rosewood Drive, Danvers, MA 01923, USA. In this case permission to
photocopy is not required from the publisher.
ISBN 981-02-4826-1
Printed in Singapore by World Scientific Printers (S) Pte Ltd
- Platinum Sponsor
Cisco SYSTEMS
EMPOWERING THE
INTERNET GENERATION"
Gold Sponsors-
^Sf -VEIL.
^ AT
Singapore Information Technology Federation
- Silver Sponsors
tntermec Sniffer
•• T E C H N O L O G I E S
A N e t w o r k A s s o c i a t e s B u s i n e s s
Supporting Sponsors.
3Com ABCHITECtS Of AN INTERNET WORID
N O I C I A ewcT
CONNECTING PEOPLE:';
'embedded
wireless
devices inc
broadaand wireless networking on a c/i/p™
reefedge onnOCO
~"~" designed by aderesy
1 .
AT H EROS"
Wireless LANs 1st Edition Benny Bing 2024 scribd download
PREFACE
Wireless local area network technologies have changed dramatically in the past 2
years. In September 1999, the IEEE 802.11 Working Group for Wireless LANs
finalized a 5 GHz standard (approved as IEEE 802.11a) that will support wireless
data rates ranging from 6 to 54 Mbit/s. In an extension to the 2.4 GHz IEEE 802.11
standard (approved as IEEE 802.11b on September 1999), information can be
transferred at data rates of up to 11 Mbit/s. These new developments have
significant implications in that the standards are now more than capable of
supporting streaming audio and video traffic needed for mobile multimedia
applications. However, since these wireless LAN standards (802.11a and 802.11b)
operate on different frequency bands (2.4 and 5 GHz) with differing rates, it is
unclear which standard will eventually prevail. With new wireless personal devices
involving Bluetooth starting to gain traction commercially, the wireless world
continues to create difficult options for both end users and service providers.
The 2001 International Conference on Wireless LANs and Home Networks
showcases some of the world's most dynamic presenters, including Dr. Leonard
Keinrock (Inventor of Internet Technology) as well as leading experts from 20
countries who presented the latest technology breakthroughs. This book is a
collection of technical papers that were presented at the conference. It comprises 32
high-quality papers that were carefully selected from more than 100 submissions,
many of which were worthy of publication. Among these accepted papers, authors
of 5 best papers were invited to contribute articles for the IEEE Wireless
Communications Magazine (formerly IEEE Personal Communications Magazine), a
reknown and highly respected technical journal. In addition, a collection of white
papers and tutorials from different companies is published in a separate volume.
I am grateful to the program committee, the sponsors and the presenters for their
time and tireless efforts in making this conference a reality and a success. Sincere
thanks also go to the World Scientific staff namely Lim Sook Cheng, Yolande Koh
and Chelsea Chin for their diligence in completing this project in a timely manner. I
hope you will enjoy reading many of the ground-breaking innovations in this
volume and look forward to your support in the next conference.
Benny Bing
Singapore, 2001
www.icwlhn.org
vii
Wireless LANs 1st Edition Benny Bing 2024 scribd download
TECHNICAL PROGRAM COMMITTEE
Lek Ariyavisitakul, Home Wireless Networks, USA.
Ben Arzine, British Telecom, UK.
Ender Ayanoglu, Cisco Systems, USA.
Yeheskel Bar-Ness, New Jersey Institute of Technology, USA.
John Barr, Motorola, USA.
Steve Bell, Agilent Interoperability Certification Labs, USA.
Justin Chuang, AT&T Research, USA.
David Cohen, 3Com, USA.
Greg Ennis, Symbol Technologies, USA.
David Everitt, Swinburne University of Technology, Australia.
Laurent Frelechoux, IBM Research, Switzerland.
Alex German, Panasonic Research, USA.
Nada Golmie, National Institute of Standards and Technology, USA
Lon Gowen, Mitre Corporation, USA.
Bob Heile, Consultant, USA.
Chin-Lin I, AT&T Research, USA.
Konosuke Kawashima, NTT Advanced Technology, Japan.
Parviz Kermani, IBM Research, USA.
Leonard Kleinrock, University of California at Los Angeles, USA.
Victor Li, University of Hong Kong, China.
Pascal Lorenz, University of Haute Alsace, France.
Teresa Meng, Stanford University, USA.
Jouni Mikkonen, Nokia, Finland.
Hiroyuki Morikawa, University of Tokyo, Japan.
Guy Pujolle, University of Paris, France.
Mike Sheppard, Ericsson, USA.
Matthew Shoemake, Texas Instruments, USA.
Roj Snellman, Intersil, USA.
Peter Steenkiste, Carnegie Mellon University, USA.
Richard van Nee, Lucent Technologies, The Netherlands.
Sergio Verdu, Princeton University, USA.
Naoaki Yamanaka, NTT Network Service Systems, Japan.
Rodger Ziemer, National Science Foundation, USA.
IX
LIST OF REVIEWERS
In addition to the program committee, the efforts of the following reviewers are
gratefully acknowledged.
A. Ahmad, DePaul University, USA.
S. Buchegger, IBM Research, Switzerland.
Y. Cao, University of Hong Kong, China.
K. Chan, University of Hong Kong, China.
W. Hirt, IBM Research, Switzerland.
Z. Lei, University of Hong Kong, China.
M. Katayama, NTT, Japan.
K. Kawashima, NTT, Japan.
M. Khan, Panasonic, USA.
Z. Lu, University of Hong Kong, China.
S. Okamoto, NTT, Japan.
M. Osborne, IBM Research, Switzerland.
D. Shimazaki, NTT, USA.
K. Shiomoto, NTT, USA.
Z. Zhang, University of Hong Kong, China.
T. Znati, University of Pittsburgh, USA.
CONTENTS
Preface vii
Part 1 Mobile Computing
802.11: No Strings Attached 3
J. Fawcett (University of Cambridge, UK) and
W. Sowerbutts (AT&T Laboratories Cambridge Ltd, UK)
Classroom in the Era of Ubiquitous Computing Smart Classroom 14
C. Jiang, Y. Shi, G. Xu and W. Xie (Tsinghua University, China)
Hybrid Jini for Limited Devices 27
V. Lenders, P. Huang and M. Muheim (ETH Zurich, Switzerland)
Part 2 Quality of Service and Wireless Internet
A DiffServ-Based Classification Scheme for Internet Traffic
Over Wireless Links 37
D. Skyrianoglou, N. Passas and
S. Kampouridou (University of Athens, Greece)
A Management Entity for Improving Service Quality in Mobile
Ad-Hoc Networks 47
M Bechler, B. Hurler, V. Kahmann and
L. Wolf (University of Karlsruhe, Germany)
Integrating IPv4 and IPv6 in Wireless Networks 57
E. Jamhour (Pontificia Universidade Catolica do Parana, Brazil)
XI
XII
Part 3 Error Control and Mobile Applications
A Low Cost Error Control Scheme for Hard Real-time Messages
on Wireless LANs 69
J. Lee, Y. Lee and S. Kim (Ministry of Science and Technology, Korea)
Bundles Replacement in Gateways 79
B. Chen, K. Elhassioni (Rutgers University, USA) and
I. Kamel (Panasonic Information and Technologies Laboratory, USA)
Part 4 Bluetooth and 802.11
Flash Notes Over Bluetooth Wireless Technology 91
P. Jappinen and J. Porras (Lappeenranta University of Technology, Finland)
Performance Enhancements to the IEEE 802.1 lb Standard 100
M. Shoemake (Texas Instruments, USA)
Part 5 Network Security
A User Authentication System for Secure Wireless Communication 113
N. Yamai (Okayama University, Japan)
H. Ishibashi, K. Abe, T. Matsuura (Osaka City University, Japan)
H. Morishita and T. Mori (Stella Craft, Inc., Japan)
Design, Implementation and Evaluation of Bluetooth Security 121
J.-Z. Sun, D. Howie, A. Koivisto and
J. Sauvola (University of Oulu, Finland)
Your 802.11 Wireless Network has No Clothes 131
W. Arbaugh, N. Shankar and J. Wan (University of Maryland, USA)
Part 6 Power Control and Performance Evaluation
XIII
Vertical Optimization of Data Transmission for Energy Aware
Mobile Devices 145
K. Dombrowski, M. Methfessel, P. Langendorfer, H. Frankenfeldt,
I. Babanskaja, I. Matthaei and R. Kraemer (IHP, Germany)
RADIOSCAPE: System Design Tool for Indoor Wireless
Communications via the Internet 154
Y. Watanabe, H. Furukawa, K. Okanoue and
S. Yamazaki (NEC Networking Research Labs, Japan)
Capture Effect in IEEE 802.11 Wireless LANs 164
Z Hadzi-Velkov andB. Spasenovski (Sts. Cyril and Methodius University,
Macedonia)
Part 7 Medium Access Control
Optimizing the Polling Sequence in Embedded Round Robin WLANs 177
L. Andrew andR. Ranasinghe (The University of Melbourne, Australia)
A Novel MAC Protocol for Power Efficient Short-Range
Wireless Networking 187
T. Y. Chui and W. G. Scanlon - University of Ulster, Northern Ireland
ROC: A Wireless MAC Protocol for Solving the Moving Terminal Problem 197
C.-H. Yeh (Queens University, Canada)
Part 8 Protocol Design and Mobility Support
Variable-Radius Routing Protocols for High Throughput, Low Power,
and Small Latency in Ad-hoc Wireless Networks 215
C.-H. Yeh (Queens University, Canada)
XIV
An Overview and Comparative Evaluation of Wireless Protocols 228
A. Mercier (Ecole Centrale d'Electronique, France)
P. Minet (INRIA, France)
L. George and Gilles Mercier (University of Paris, France)
Supporting Mobility in Distributed Proxy Server Architecture 241
H. Lee, K. Chung (Kwangwoon University, Korea) and
K. Kim (LG Electronics, Korea)
Part 9 Interoperability and Co-existence
LAPP Enhancement Protocol 253
X. Jin and J. Li (Xidian University, China)
The Hybrid of Listen-Before-Talk and Adaptive Frequency Hopping
for Coexistence of Bluetooth and IEEE 802.11 WLAN 263
Y. Kim, B. Zhen and K. Jang
(Samsung Advanced Institute of Technology, Korea)
A Hybrid Architecture of UMTS and Bluetooth for Indoor
Wireless/Mobile Communications 273
T. Kwon, R. Kapoor, Y. Lee, M. Gerla (University of California , USA)
and A. Zanella (Universita degli Studi de Padova, Italy)
Part 10 Multicarrier Systems
Adaptive Link Adaptation for Multicarrier Systems 285
F. Tang, S. Thoen, M. Engels andL. Deneire (Interuniversity
Microelectronics Center, Belgium)
On the Performance of the Ubiquitous Antennas for the Reception
of COFDM Signals 295
S. Okamura, S. Komaki (Osaka University, Japan) and
M. Okada (Nara Institute of Science and Technology, Japan)
XV
Improved Automatic Frequency Control for OFDM 305
H. Hosseini and B. Rohani (Genista Research, Singapore)
Part 11 Antennas and Interference Control
A MIMO Architecture for Wireless Indoor Applications 317
L. Giangaspero, G. Paltenghi (CEFRIEL, Italy) and
Luigi Agarossi (Philips Research Monza, Italy)
Inter-cell Interference Effect on OFDM-based Wireless LAN 327
P. Mahonen and A. Jamin (University of Oulu, Finland)
Part 12 Mobile Ad-Hoc Networks
Analyzing Capacity Improvements in Wireless Networks by Relaying 339
H. Karl and S. Mengesha (Technical University of Berlin, Germany)
Wireless LAN with Wireless Multihop Backbone Network (WMLAN) 349
K. Mase, N. Karasawa, M. Kusumi, K. Nakano and
M. Sengoku (Niigata University, Japan)
Author Index 359
Parti
Mobile Computing
Wireless LANs 1st Edition Benny Bing 2024 scribd download
802.11: N O S T R I N G S A T T A C H E D
J O H N K FAWCETT
Laboratory for Communications Engineering, University of Cambridge,
Trumpington Street, Cambridge CB2 1PZ, UK
E-mail: jkf@uk.research.att.com
WILLIAM R S O W E R B U T T S
AT&T Laboratories Cambridge Ltd, 24a Trumpington Street,
Cambridge CB1 1QA, UK
E-mail: will@sowerbutts.com
We describe the deployment strategy and application-level use of indoor and out-
door, point-to-point and point-to-multipoint 802.11b networks. For residential
environments, applications combining radio networks with multimedia, location
systems and home security systems are presented. We extend the home network
paradigm with vehicular-based mobile computation where interference, shielding,
range and power consumption issues are prevalent. The vehicle is considered both
as a server—the user transports the 'master copy' of data—and as a client through
disconnected operation and intelligent caching. Further, we discuss experiences of
realising high bandwidth, low latency, fixed-broadband Internet access using out-
door 802.11b installations. Frequently neglected aspects of theoretic and practical
network and data security are explored.
1 Introduction
Houses are for living, relaxing and spending time with the family. Increasingly
these activities involve one or more personal computers. Parents often find
themselves pruning the cabling sprawl laid down by their teenage offspring for
head-to-head gaming. Interconnect technologies such as the Universal Serial
Bus (USB)a
, IrDA6
, FireWire (IEEE 1394)6
, X10c
, and Networked Surfaces7
seek to reduce cabling. Fully wireless mobility, eliminating short range line-of-
sight requirements, is introduced by radio-based approaches including Blue-
tooth'*, PEN1
(formerly Piconet), HomeRFe
and the 802.114
family.
This paper focuses on 802.11b and first discusses the outdoor installations
used by the authors, comparing cost to the consumer, investment in infrastruc-
ture, performance and security to alternative always-on consumer broadband
a
USB Implementers Forum: http://www.usb.org/
infrared communication, http://www.irda.org/
c
home automation, http://www.xlO.org/
d
short range radio, http://www.bluetooth.org/
e
http://www.homerf.org/
3
4
provisions. Identical hardware finds further use within the home in Section
3 transporting bandwidth intensive video streams and delay-sensitive control
signals. Applications and services enabled by mobile computing and wireless
communications in a vehicle context are explored in Section 4.
2 Fixed Broadband Wireless
Employers seek to maximise staff productivity in order to lower operating
overheads and remain competitive. Providing access from home to their cor-
porate e-mail and filespace encourages employees to continue their work at
home and allows them to remain in touch with colleagues. Broadband to the
home can provide the rich information services expected of an office environ-
ment, allowing telecommuting and corporate expansion without the risk or
financial burden of increasing office space.
Access solutions making new use of existing wired networks—ISDN, leased
lines, digital subscriber line (DSL) and cable modems—all provide sufficient
bandwidth but incur repeated monthly costs from the service providers which
own the infrastructure and provide connectivity. Offices already enjoy high-
bandwidth Internet connections and, from their rooftops, can offer line-of-
sight radio connections directly to properties in the surrounding suburbs. Or-
ganisations providing employees with wireless connectivity to their networks
can eliminate ISP subscription and most running costs in exchange for a small
slice of the network administrator's time. Furthermore, broadband wireless
802.11b surpasses the bandwidth and latency offered by cable modems and
DSL solutions (Table 1). The imminent release of 802.11a will further widen
the price/performance gap.
Most off-the-shelf 802.11b products do not offer external antenna connec-
tion jacks, which has severely limited the uptake of outdoor equipment and
long-range deployments. Lucent Technologies' ORiNOCO product family'
are one exception; SMC offer a similar product based on the Prism II chipset.
The ORiNOCO cards cost approximately US$100 and outdoor antennae retail
for US$120. The initial cost to the consumer is therefore comparable to that
of cable modem and DSL services.
The low latency of the wireless solution listed in Table 1 results from
connections being direct rather than routed through a chain of ISP networks.
The resulting responsive interactive behaviour of applications facilitates pro-
ductive working, and was unanimously preferred by subjects in the trials.
In the United Kingdom the European Telecommunications Standards In-
'http:// www.wavelan.com/
5
Table 1. Comparison of popular broadband solutions in Cambridge (UK)
Technology
ISDN
Cable modem
DSL
802.11b
Typical Bandwidth/kbps
64 / 128
512
512
4800
Latency/ms
90
40
50
2
Table 2. Outdoor 802.11b deployments in Cambridge
Distance/km
0.25
0.5
1
2
4
7
10
Mode/Mbps
11/5.5
5.5/11
Latency/ms
2.0
2.0
2.0
2.0
2.0
2.1
2.2
stitute (ETSI)3
and the Radio Authority (RA)h
mandate that the effective
isotropic radiated power (EIRP) output of systems in the 2.4 GHz band, mea-
sured at the antenna, be capped at 100 mW. This permits aerials of up to
12 dBi gain to be used with red* ORINOCO cards.
The authors performed trials using Agere Systems 16 element vertically
polarised directional Yagi antennae with 14 dBi gain, mast mounted at con-
nection end points. Losses slightly exceeding 3 dBi were introduced by cabling,
surge arrestors, band-pass niters and inline adaptors. Azimuthal gain plots8
indicated the main beam width to be 7 degrees, with a half-power beam width
of 30 degrees.
Antennae were mounted on the lab roof and oriented to cover popular sub-
urbs of Cambridge and near-by commuter villages. Similar antennae secured
at domestic end-points were oriented back towards the lab. The established
links are summarised in Table 2. Lucent quote a maximum achievable range
of 25 km in ideal conditions with symmetric Yagi antennae if, as is often the
case with domestic connections, a single megabit of bandwidth is tolerable.
A line-of-sight to accommodate the Presnel bulge proved essential for links
9
http://www.etsi.org/
h
http://www.radio.gov.uk/
•"Red" ORiNOCO cards are designed for use with high-gain antennae and contain lower
powered radio transmitters than their "black" counterparts, which are typically used by
mobile nodes.
6
exceeding 500 m; a partially obscured trajectory sufficed for shorter paths.
Where geographic and topological constraints prevent direct connection, relay
stations can be used to forward packets. Azimuthally orienting the antennae
proved to be less troublesome than was expected; a good connection for a
10 km link was established simply by aiming at roughly the correct point on
the horizon.
Yagi antennae are polarised and sensitive to rotation about their length-
wise axis. The performance of the connections is substantially invariant to
everyday weather conditions; link goodput does not suffer from rain fade, al-
though the greater microwave opacity presented by fog causes a significant
decrease in signal-to-noise ratio (SNR), ultimately resulting in drop-out.
Thus far, each link is point-to-point. Trials of point-to-multipoint and
mesh networks are underway, offering the potential for higher aggregate band-
width and adaptive routing for fault and congestion resilience. In a dense mesh
the links are generally shorter than those used above and omni-directional an-
tennae are more appropriate, as illustrated in Figure 1.
Mesh networks over 802.11b are not without compromise: the necessary
intercommunication requires agreement over channel and encryption key. Spa-
tial reuse of channels in non-interfering bands can increase total network ca-
pacity at the expense of potentially introducing nodes of articulation whose
failure may partition the network. While parameter co-ordination is feasi-
ble within an organisation, the need for disjoint institutions to co-operate in
synchrony may prove troublesome.
The increased internal bandwidth is easily sufficient for voice-over-IP or
video conferencing traffic. However, encrypted tunnels between the houses of
participating individuals would be required if the internal bandwidth of the
mesh is to be securely exploited. Link-layer wired equivalent privacy (WEP)
offers a false sense of security as the integrity of the secret key is prone to
compromise10
. Point-to-point IPsec or Virtual Private Network (VPN) tun-
nels would provide end-to-end encryption but the human overhead of estab-
lishing per-tunnel shared keys scales poorly. Opportunistic Encryption^ solves
this problem by dynamically generating shared secrets for IPsec connections as
they are constructed. When one node needs a secure connection to another—
for example when a voice-over-IP call is made—each fetches the other's public
key from a trusted repository. Responses from the repository server are signed
under a key whose public component is well-known. The signature is verified
to prevent man in the middle attacks, and a shared secret is constructed by
both nodes using the local private key and the peer's public key. This ma-
3
implemented, for example, in PreeSWAN. http://www.freeswan.org/
7
a a
Isn
Figure 1. Mesh networking with 802.11b
terial is knowable only by the two communicating endpoints and suitable for
deriving IPsec key material.
The contributions to wide-area networking are the highly cost-effective
provision of significant, reliable, always-on connectivity to the home. Wireless
Internet Service Providers (ISP) are undercutting their wire-based counter-
parts in certain US cities although the current scale of operations leaves many
neighbourhoods without coverage. The UK consumer has yet to be offered
wireless broadband. Value for money and unobtrusive installation are the
primary requirements of most homeowners; each can be satisfied by 802.11b
hardware. Operating costs are minimal and employers can affordably provide
subscription-free or subsidised bandwidth to employees.
3 Home Area Networking
PCs are becoming increasingly common in the domestic environment; they are
used not only in their traditional office roles, but as entertainment centres and
information gateways. The convenience and value of networking PCs in the
home makes for familiar reading. However wired networking in the home is
not as convenient as in an office as homes typically do not have either suitable
cabling or cable trunking installed.
This problem is particularly marked in the UK, where new-build houses
8
are rare and cables must be retro-fitted to existing properties. Hollow walls
are uncommon, and the expense of buying and cabling network access points
is overwhelmed by the cost of "making good" aesthetic aspects. Wireless tech-
nologies have a clear advantage in not requiring any structural modifications,
especially in listed buildings where approval must be sought. The radio zone
around an 802.11b node is sufficiently large to encompass an entire house,
which allows the use of IBSS mode ad-hoc networks. Wireless networks make
possible many applications which would otherwise be prohibitively expensive.
The authors conducted comparison trials using a group of technical people
with prior home Ethernet deployments. Hardware wireless access points and
NAT bridges were eschewed in favour of Linux boxes, which offered greater
configurability. These allowed the use of per-flow rate throttling, packet filter-
ing and more secure firewalling, as well as routing onto the wide-area networks
discussed in Section 2. The radio channel used for the WAN was chosen to
avoid interference with the 802.11b network within the house.
The trials revealed that popular applications of wired networks remained
so with their wireless counterparts; file-sharing, gaming and Internet access
were used extensively by all participants. An unexpectedly popular applica-
tion was streaming media—several participants streamed live video encoded
from a frame grabber and TV tuner to watch TV on their wireless laptops,
in one case using a data projector and HiFi as an immersive home cinema.
One participant reported installing a new digital TV aerial in his loft using
the wireless video stream to guide alignment. Spooling the encoded video to
disk allowed the system to be used as a video recorder for purposes of time
shifting programming.
Streaming music from storage to playback devices was also popular; one
participant digitised his entire music collection of several hundred CDs, loss-
lessly compressed, onto a 360 Gb RAID-5 array. This application has wide
appeal as it makes one's music collection available anywhere in the house
without the need to hunt for, or change, media.
High-quality webcams connected to nearby embedded computers allow
wireless video conferencing, and also double up as security cameras. Using
the wireless wide-area network the information from these cameras could be
easily transported off site. The privacy concerns of distributing live video
from inside the house are addressed by using an asymmetric cipher to encrypt
each frame on the capturing PC. The private component of the encrypting key
is held securely and only released to the relevant authorities (eg, the police or
insurance company) when the owner chooses to do so. Thus, even if the PC
which encrypts the video is compromised, the spying intruder cannot decrypt
previously streamed video data.
9
The wireless network also proved useful for data acquisition around the
house. One house has curtains which open or close under computer control,
and a wireless weather monitoring system from Oregon Scientific. Data acqui-
sition cards in the embedded PCs throughout the house sample signals from
microswitches concealed in each door and window, connected by short wires.
Information from these sensors is fed over the wireless network for storage in
a database and used for security applications—for example, the occupant is
alerted upon leaving the house if any windows remain open.
A second house uses microswitches and wall switches connected to small
microcontroller boards which communicate over a shared RS485 serial bus.
The wall switches become event generators controlling digitally dimmable
lighting connected to the wireless network, replacing the traditional hard-
wired light switches in each room. However, the serial bus must still be wired
to nearest the embedded 802.11 wireless node. A future study will replace this
serial bus with a Bluetooth network. Bluetooth was chosen because its low
power consumption allows battery powered switches which require infrequent
cell replacement. Light switches could be glued to the wall since there is no-
longer a requirement for any wires. These short-range Bluetooth networks
would be bridged by the nearest embedded PC onto the 802.11 backbone
network.
The embedded PCs also poll local Active Badge9
networks; an Ac-
tive Badge is a battery-powered, wearable computing device capable of bi-
directional infrared (IR) communication with fixed 'stations'. Badges beacon
periodically to advertise their presence; their location is determined by which
station can hear them. Occupants who choose to wear an Active Badge make
their location available to the house computers, and can issue events by click
buttons on the Badge. The house computers control Sentient Computing5
applications based on the location and actions of occupants. For example,
curtains, lighting, music and so on can all be automatically controlled.
The Badges provide a two-button control set which users carry contin-
uously. However, to support less cumbersome interaction with complex de-
vices an 802.1 lb-enabled palmtop is used as a ubiquitous remote control and
portable media player.
4 Car Area Networking
We have extended home and corporate networks into the private vehicles of
several volunteers. Car-PCs provide navigation and guidance aids for the
driver2
and entertainment, information and workstation facilities to any pas-
sengers. The hardware hosts analog and digital I/O logic, creating a mobile
10
Figure 2. Car-PC and environmental sensors
data acquisition and information processing platform. Radio networking pro-
vides a convenient, high bandwidth transfer mechanism for use between the
vehicle computer and a fixed base station, or amongst a collection of vehicles.
Car-PCs axe operable both when driving and with the ignition off.
4J Environmental Monitoring
Our Car-PCs (see Figure 2) continually log meteorological data and ambi-
ent atmospheric pollutant concentrations: every second the vehicle GPS is
polled and measurements are taken from environmental sensors which mea-
sure ambient light, temperature, barometric pressure and humidity, as well
as atmospheric levels of nitrogen dioxide, sulphur dioxide, carbon monoxide
and ozone. Extensible Markup Language (XML) events are generated and
serialised to a logfile. Some data have immediate application, for example if,
while driving, a high Nitrogen Dioxide level is encountered the climate control
unit can be directed to recirculate air and thus block out carcinogenic traffic
fumes. The previous setting can be restored when pollutant concentrations
return to safe levels.
On arrival at home or work, a Car-PC uses the bandwidth afforded by the
radio network to upload the logfiles accumulated since its previous synchro-
nisation. The data are then useful to city planners striving to reduce urban
pollution for students and tourists. Wired networks such as Ethernet and USB
11
would require trailing cables out to the parking lot; using removeable media
such as compact flash or floppy disks would necessitate additional equipment
in the car and still require human intervention to transfer the data. The range
of Bluetooth is insufficient to communicate with our lab on the fourth floor
and infra-red transducers are saturated by sunlight during daylight hours pre-
cluding either technology from application in this context. The convenience
and automation of the 802.11b package is allowing city councils to consider
installing the equipment in busses and taxis to collect data in a larger survey.
4-2 Entertainment
The convenience of the wireless network enables spontaneous downloading of
music to the Car-PC system. The hassle-free user experience does not present
a psychological barrier or otherwise deter use of the system—from their home
or office PC the user has only to drag and drop audio files onto a icon depicting
the car. An unduly tedious set-up procedure would be excessively cumbersome
and cause users to elect to live with their existing configuration and avoid the
agitation associated with makes changes.
Vehicular use of 802.11b is not limited to file copying. Car-PCs operate an
Active Badge station9
which is used to identify passengers, distinguish theft
and use by the owner and control the entertainment and navigation software.
As I approach my driveway and the radio network connection with the com-
puters in my house is restored real-time events can be passed to configure the
house for my arrival. For example, the car stereo can communicate with a
PC in the house to create the effect of the audio stream 'following-me' into
the house. In order to achieve this the radio layer must recognise its peer and
complete any handshaking in a timely fashion. For example, DECT supports
appropriate ranges but is not designed for situations where recovery from
prolonged signal loss is expected and consequently compliant devices may not
notice the presence of another node for up to 20 minutes after communica-
tion becomes possible. Bluetooth and PEN devices remain alert to changing
connectivity and could be used in place of 802.11b for this application. How-
ever, PEN has insufficient bandwidth to stream reasonable quality audio to
the house, as is necessary if the track being played is not present in the user's
home music collection.
4-3 Document Transfer
A car with a Car-PC can be used to transfer files, sneaker-net style, as the
owner drives about. Using the car as a briefcase to transfer electronic doc-
uments simplifies to a drag-and-drop copy operation. More often, users save
12
and edit documents directly over the network using NFS or Samba services
hosted by the Car-PC. The former modus operandi leaves the 'master copy'
at work—a copy is taken away—suiting group-working but necessitating dis-
connected operation and update-merging techniques. The latter paradigm
corresponds to single-owner documents and greatly simplifies the user's task
of transporting files; consider, for example, a sales executive storing all his
PDF brochures, client notes and his diary on a Car-PC.
4-4 Future Applications
A future car could exploit available broadband Internet connectivity by con-
necting to its manufacturer's website for code updates, safety advisories or
simply to book a service or MOT.
The computer might utilise location-based services, for example offering
a search of near-by restaurants, service stations or digital map vendors to the
occupants. Many such interactions can be triggered automatically, for exam-
ple on approaching a city, a vehicle's computer might procure an enumeration
of digital map distributors so the driver can easily purchase a detailed town
plan before entering the city centre.
5 Conclusion
Outdoor 802.11b deployments are cost-effective and satisfy the bandwidth
and latency requirements of telecommuters residing up to 10 km from their
employer's office. Encrypting tunneling protocols safeguard personal and cor-
porate data and scale linearly to mesh networks through opportunistic encryp-
tion. Within the home we enabled novel applications and improved existing
ones through mobile and embedded computers, and reduced wiring clutter
without compromising the decor or aesthetics. In a wireless house careful
consideration must be given to the privacy of the occupants and the security
of the network. For motor vehicles, navigation, sensing, data transport and en-
tertainment applications based on Car-PCs and wireless communication were
presented. The use of identical hardware at work, at home, between the two
and in the car results in reduced costs. User interface familiarity additionally
benefits employers by reducing the cognitive load of performing simple con-
figuration, thus increasing productivity. Next-generation wireless standards
are emerging, offering increased bandwidth and strengthened security.
13
Acknowledgements
John Fawcett receives an EPSRC grant and a CASE award from AT&T Lab-
oratories, Cambridge and is working on a PhD at the Laboratory for Commu-
nications Engineering. Thanks are due to Martin Brown for suppling some of
the equipment and to Ian Wassell and Alastair Beresford for their assistance
with radio regulatory compliance issues.
References
1. F. Bennett, D. Clark, J.B. Evans, A. Hopper, A. Jones, and D. Leask.
Piconet - embedded mobile networking. In IEEE Personal Communica-
tions, Vol. 4, No. 5, 8-15, 1997.
2. J.K. Fawcett and A.H. Jones. The road to driveable computing. Royal
Institute of Navigators Journal, To appear.
3. J.K. Fawcett and W.R. Sowerbutts. Wireless network security. In press,
2001.
4. V. Hayes. IEEE standard for information technology - telecommunica-
tions and information exchange between systems - local and metropolitan
networks - specific requirements - part 11: Wireless Ian medium access
control (mac) and physical layer (phy) specifications: Higher speed phys-
ical layer (phy) extension in the 2.4 ghz band. Technical Report Desig-
nation 802.11b-1999, IEEE, 1999.
5. A. Hopper. Sentient computing. In The Royal Society Clifford Patterson
Lecture, 1999.
6. G.A. Marazas. IEEE standard for a high performance serial bus. Tech-
nical Report Designation 1394-1995, IEEE, 1995.
7. J. Scott, F. Hoffmann, G. Mapp, M. Addlesee, and A. Hopper. Networked
surfaces: A new concept in mobile networking. In 3rd IEEE Workshop
on Mobile Computing Systems and Applications, 2000.
8. Lucent Technologies. User's guide for out-
door router outdoor antennas rev. c. In
ftp://ftp. orinocowireless. com/pub/'docs/Wave A CCESS/MANUAL/
OR/oaig.c.pdf, 2000.
9. R. Want, A. Hopper, V. Falcao, and J. Gibbons. The active badge lo-
cation system. ACM transations on Information Systems, 10(1):99-102,
January 1992.
10. S. Fluhrer, I. Mantin and A. Shamir. Weaknesses in the Key Scheduling
Algorithm of RC4. Selected Areas in Cryptography, 2001.
CLASSROOM IN THE ERA OF UBIQUITOUS COMPUTING
SMART CLASSROOM
CHANGHAO JIANG, YUANCHUN SHI, GUANGYOU XU AND WEIKAIXIE
Institute of Human Computer Interaction and Media Integration
Computer Science Department, Tsinghua University
Beijing, 100084, P.R.China
E-mail: jiangch @media.cs.tsinghua.edu.en, shiyc @tsinghua. edu. en,
xgy-des@mail.tsinghua.edu.en, xwk@media.cs.tsinghua.edu.cn
Abstract: This paper first presents four essential characteristics of futuristic classroom in the
upcoming era of ubiquitous computing: natural user interface, automatic capture of class
events and experience, context-awareness and proactive service, collaborative work support.
Then it elaborates the details in the design and implementation of the ongoing Smart
Classroom project. Finally, it concludes by some self-evaluation of the project's present
accomplishment and description of its future research directions.
Keywords: Ubiquitous Computing, Intelligent Environment, Multimodal Human- Computer
Interaction, Smart Classroom
1 Introduction: From UBICOMP to Smart Classroom
Desktop and laptop have been the center of human-computer interaction since
the late of last century. As is a typical situation of human's dialogue with computer
that a single user sits in front of a screen with keyboard and pointing device,
interacting with a collection of applications [Winograd 1999]. In this model, people
often feel that the cumbersome lifeless box is only approachable through complex
jargon that has nothing to do with the tasks for which they actually use computers.
Too much of their attention is distracted from the real job to the box. Deeper
contemplation on valuable matured technologies tells us: the most profound
technologies are those that disappear, which means they weave themselves into the
fabric of everyday life until they are indistinguishable from it [Weiser 1991]. We
use them everyday, everywhere even without notice of them. Based on this point of
view, computer is far from becoming part of our life.
Mark Weiser first initiated the notion of Ubiquitous Computing (UBICOMP) at
Xerox PARC [Weiser 1993], which envisioned, in the upcoming future, ubiquitous
interconnected computing devices could be accessed everywhere and used
14
15
effortlessly, unobtrusively even without people's notice of them, just as electricity
or telephones of today. This inspiring view of prospect has been accepted and
spread so fast and widely that in a short time of a few years, many ambitious
projects have been proposed and carried on to welcome the advent of UBICOMP.
There are a bunch of branch research fields under the banner of UBICOMP, such as
Mobile Computing, Wearable Computing and also Intelligent Environment, etc.
The focus of this paper, Smart Classroom, belongs to the field of Intelligent
Environment. But what is Intelligent Environment? In our point of view, we define
it as an augmented spacious environment populated with many sensors, actuators
and computing devices. These components are interwoven and integrated into a
distributed computing system which is able to perceive its context through sensors,
to execute intelligent logic on computing devices and serve its occupants by
actuators. (In some research projects, Intelligent Environment is also referred as
Interactive Space, Smart Space etc.)
In researches of Intelligent Environment, there are several relevant and
challenging issues need to be solved, such as the interconnection of computing
devices on many different scales, the handling of various mobility problems caused
by user's movement, and network protocol, software infrastructure, application
substrates, user interfaces issues etc. Although many projects have been conducted
in the name of Intelligent Environment, they have different emphases. Some focus
on the integration of different sensing modalities [Coen 1999, HAL 2000], some
aim at the adaptability of Intelligent Environment to user's preference [Mozer
1999], some are interested in automatic capture of events and rich interactions that
occurs in an Intelligent Environment [eClass 2000, Adowd 2000], and some target
at facilitating the collaboration of multi-user multi-device within a technology-rich
environment [Interactive Workspace 2000, Fox 2000]. We can easily enumerate
several other ongoing Intelligent Environment projects with different
specializations, such as Georgia Tech's Aware Home [Aware Home 1999, Kidd
1999], IBM Research's DreamSpace [DreamSpace], Microsoft Research's
EasyLiving [EasyLiving] etc. Our institute developed special interest in exploring
the impact of ubiquitous computing to education. This leads to the project of Smart
Classroom. The Smart Classroom is a physical experimental environment, which
integrates multimodal human computer interface with CSCW modules collaborating
through inter-agent communication language to provide a smart space for lecturer's
natural use of computer to give class to distance learning students.
In the rest of this paper, we're going to first present our views of futuristic
classroom in UBICOMP. And then toward the ideal model of classroom, which
sounds a little Utopian, we'll explain the idea and focus of our exploration. Later
some details in the design and implementation of our present work will be
illustrated. We'll conclude by a short description of our future goals.
16
2 What Should Classroom in The Era of UBICOMP Be Like?
Michael H. Coen from MIT Artificial Intelligence Lab said, "Predicting the
future is notoriously difficult". [Coen 1999] Yes, we're not able to prescribe what
future would be, but we're able to create toward what we think it would be. In our
point of view, the following features are essential to a smart classroom in the era of
UBICOMP, and will serve as the guidelines in our ongoing Smart Classroom
project.
We have generalized four characteristics of futuristic classroom, which are:
natural user interface, automatic capture of class events and experience,
context-awareness and proactive service, collaborative work support.
2.1 Natural user interface
As Mark Weiser has observed, "Applications are of course the whole point of
ubiquitous computing". In accordance with this essence of UBICOMP, it is
necessary for a smart classroom to free its occupant's attention to computer. To
rescue people's energy from irrelevant interaction widi computer to the intentioned
goal, allowing user's interaction with computer as naturally as possible is vital. In
such a new paradigm of human-computer interaction, people input information into
computer in their most familiar and accustomed ways like voice, gesture, eye-gaze,
expressions etc. Auxiliary input devices like keyboard, mouse, are not necessary. In
the reverse side, computer tends to serve people like an intelligent assistant. It
utilizes technologies like projector display, voice synthesis, avatar, etc. This is what
we call natural user interface.
To get a clearer image, suppose a lecturer in the Smart Classroom conducting
the class by voice. "Let's go to chapter two". Computer recognizes phonetic
command and projects the wanted courseware of chapter two on display. Lecturer
also uses hand gesture as a virtual mouse to annotate on the projected electronic
board. Through combination of eye gaze (or finger pointing) and voice command,
lecturer can zoomed in the image of an area in the projector to give emphasized
explanation on a specific topic.
2.2 Automatic capture of class events and experience
This is what eClass project of Gatech called "automated capture, integration
and access" problem. We use computer in classroom not only to improve die quality
of teaching activity, but also to augment its capability, which was impracticable
traditionally. The automatic capture of class event and experience belongs to such
capabilities. It's not just record of video and audio in the environment, which is
common in traditional distance learning-television broadcasting program. It
17
includes the record of group collaboration, multimedia events, multiple channels of
human computer interaction, etc, all the events and experience that happened in the
environment. The captured events and experience should be assembled into a kind
of multimedia compound document. People can recreate the class experience by
play the recorded multimedia compound document, and also can search a specific
event or query knowledge within the compound document. This technology
provides lecture content to students who are unable to attend the class in person, as
well as to those who wish to review the materials later.
For example, suppose a lecturer giving a class on Artificial Intelligence in a
Smart Classroom. All the audio, video information, lecturer's annotation events,
student's question events, Smart Classroom's controlling of lights, slides, etc, are
recorded into a multimedia compound document. When a student wants to review
the knowledge of Alpha-Beta Pruning algorithm, he can just query about it through
his laptop computer, and rewind to the previous talk on it for a quick review and
then comes back. After the class, students can also replay the document to recreate
the class experience.
2.3 Context-awareness andproactive service
What is context-awareness? According to Dey & Abowd (from Gatech 1999),
"context is any information that can be used to characterize the situation of an
entity, where an entity can be a person, place, physical or computational object",
"context-awareness is to perceive the context by system so as to provide
task-relevant information and/or services to a user, wherever they may be". Which
means the Intelligent Environment can understand user's intention not only based
on audio-visual inputs, but also based on its situational information. Proactive
service means to serve the user without his request. Proactive service is based on the
Intelligent Environment's capability of Context-awareness. This model of service is
disparate from traditional human-computer interaction paradigm, in which computer
respond to human's explicit command. In the Intelligent Environment, the computer
remembers the past, recognize the present, and predicate the future. It reasons
human's intention through analysis of all the information from accumulated
knowledge base. Then it tries to serve its occupants proactively with the reasoned
intention of its user.
For example, the lecturer is explaining a formula displayed on the electronic
board. When the lecturer points at it and starts to talk about it, the computer
understands that the lecturer is going to attract students' attention to the specific
area of display. Then it zooms in the area containing that formula on the display
without the need of lecturer's commanding "Zoom in this region". Another
example, when the lecturer wants to have a student named Wang to give his opinion
on a topic, he points at the student and says, "Wang, would you please say
18
something about what you think of this problem?" The computer then automatically
focuses the video camera and microphone array on Wang and filters out the noise
emitted from other spaces.
2.4 Collaborative work support
Class is essentially a collaborative procedure evolving multiple participants. In
the environment of ubiquitous computing, the introduction of many interconnected
computing devices and wide area network support enables us to extend beyond the
space boundaries imposed by traditional classrooms. With this technological
advance, collaborations of multi-user and multi-device can be possible. And the
support for collaboration is becoming a requisite of a smart classroom. The
collaborative work support of a Smart Classroom can be categorized into two
classes. One is the collaboration of multiple attendants within the Smart Classroom
holding various computing devices like, pen-based devices, hand-held devices and
wearable computer etc. The other is the collaboration of remote participants and
local attendants. The demand for collaboration support is so obvious that many
commonly observed tasks in a classroom, such as group discussion, evolve the
collaboration among multiple persons. There are some projects specialized in
enabling and exploiting smart classroom's collaboration support, such as
collaborative note-taking in both Gatech's eClass [eClass 2000] and Stanford's
Interactive Workspaces [Interactive Workspaces 2000 ].
3 The Focus of Smart Classroom
Smart Classroom is a big project, every above-mentioned aspect of it is
challenging and a long-term effort. Our institute has been committing itself to the
research on multimodal human computer interfaces, CSCW in wide area network,
and also multimedia integration. Based on our existing research results we have
been investigating Smart Classroom's following features: natural user interface,
automatic capture of classroom events and experience, and collaborative work
support. So in initial phase of our project, we focus on applying our previous
research achievements to realize an experimental environment. We have set up the
physical experimental environment to demonstrate our idea and focus. In this Smart
Classroom, we mainly aim at the following features: conducting lessons by means
of gesture and voice command, capturing class events and operation such as
manipulation on courseware, video-audio streams of class, etc, admission control of
students using all kinds of mobile computing devices. In order to give clearer image
19
of our research, an elaboration of the physical experimental environment layout and
its user-experience scenario are given as following.
3.1 The layout ofSmart Classroom
Our Smart Classroom is physically built in a separate room of our lab. Several
video cameras, microphones are installed in it to sense human's gesture, motion and
utterance. According to UBICOMP's characteristic of invisibility, we deliberately
removed all the computers out of sight. Two wall-sized projector displays are
mounted on two vertically crossed walls. According to their purposes, they are
called "Media Board" and "Student Board" separately. The Media Board is used for
lecturer's use as a blackboard, on which prepared electronic courseware and
lecturers' annotation are displayed. The Student Board is used for displaying the
status and information of remote students, who are part of the class via Internet. The
classroom is divided into two areas, complying with the real world classroom's
model. One is the teaching area, where is close to the two boards and usually
dominated by lecturer. The other is the audience area, where is the place for local
students. Why are both remote students and local students supported in this room?
The answer is simple, that we're complying with the philosophy of Natural and
Augmented. Natural means we'll obey real-world model of classroom as much as
possible to provide lecturer and students the feeling of reality and familiarity, which
leads to the existence of local students. Augmented means we'll try to extend
beyond the limitation imposed by the incapability of traditional technology, which
is the reason for remote student.
AStudent Boards
^f DDDDDD
DDDDDD
DDDDDD
DDDDDD
DDDDDD
DDDDDD
Audience Area »"Teaching Area"!
Figure 1. Layout of Smart Classroom
In Smart Classroom, users' rights to use the room are mapped to their
identification. There is an audio-visual identification module for identifying the
users in this room and authorizing control right to lecturer. With the help of visual
20
motion-tracking module, Smart Classroom can be aware of its occupants' places in
the room. Once a user identified as lecturer entering the teaching area, he is
authorized to control the Smart Classroom by voice and gesture command. Lecturer
can use hand-gesture as a virtual mouse on the Media Board to annotate, or
add/move objects on the electronic board. He can also command linking in
courseware, perform operations like scrolling pages, removing objects, granting
speech right, etc by voice. All the lecturer's operation on the courseware and
audio-video information captured in the Smart Classroom are automatically
recorded and integrated to a multimedia compound document. The recorded
information is simultaneously broadcasted to remote Students via Internet
synchronously. Through software's application layer trans-coding and adaptive
reliable multicast transport, remote students are promised to join the class with
devices varied in computational power and display resolution through
heterogeneous network varied in quality of service.
Figure 2. Typical scenario in Smart Classroom
3.2 A typical user experience scenario
The following is a typical user-experience scenario happened within the Smart
Classroom. Multiple persons enter the room through the door. At the door, there is
an audio-visual identification module identifying the entering person's identity
through facial and voice identification. If the person is identified as lecturer, he is
granted the control right of the Smart Classroom. The visual motion-track module
tracks the lecturer's motion in the room. Once he steps into the teaching area, he
will be able to use gesture and voice command to exploit the Smart Classroom to
give lessons. Persons in the Smart Classroom other than lecturer are deemed as
local students. When the lecturer is in the teaching area, he can start the class byjust
21
saying, "Now let's start our class." The Smart Classroom then launches necessary
modules such as Virtual Mouse agent, Same View agent (which will be talked about
later). Lecturer loads prepared electronic courseware by utterance like, "Go to
Chapter 1 of Multimedia course". The HTML-based courseware is then projected
on the wall display. Lecturer can use hand-motion to stimulate the Virtual Mouse
agent to annotate on the electronic board. Several type of hand gestures are assigned
corresponding semantic meanings, which cause several operations like highlighting,
annotating, adding pictures, remove object, executing links, scrolling pages etc, on
the electronic board. Lecturer can also grant speech right to remote students by
finger pointing or voice command, like "Li, please give us your opinion". On the
Student Board, remote students' photos and some information as name, role, speech
right etc are displayed. When a remote student requests for floor, his icon on the
Student board twinkles. Once the lecturer grants the floor to a specific remote
student, his video and audio streams are synchronously played both in the Smart
Classroom and on other remote students' computers.
4 Details of Smart Classroom's Design and Implementation
The Smart Classroom is essentially a distributed parallel computing
environment, in which many distributed software/hardware modules collaborate to
accomplish specific jobs. Software infrastructure is the enabling technology to
provide facilities for software components' collaboration. There are some
alternative solutions to software infrastructure, such as Distributed
Component-Oriented Model, like EJB, CORBA, DCOM, etc, and Multi-Agent
Systems (MAS). In the context of Intelligent Environment, Multi-Agent System is
more competent than Distributed Component-Oriented Model due to the following
reasons: higher encapsulation level, faster evolution from design to implementation,
easier development and debugging, and most importantly, more accordant to the
need of dynamic reconfiguration and loose-coupling.
4.1 4.1 Software platform-OAA
In current stage, instead of developing our own Multi-Agent System, we
choose to use SRI's famous open source MAS product, Open Agent Architecture
(OAA) [OAA]. There're already many successful multimodal human-computer
interaction projects built on OAA. Its delegating computing model also fits well in
our need of software infrastructure. In OAA's delegating computing model, the
network of distributed software modules is conceptualized as a dynamic community
of agents, where multiple agents contribute services to the community. When
external services or information are required by a given agent, instead of calling a
22
known subroutine or asking a specific agent to perform a task, the agent submits a
high-level expression describing the needs and attributes of the request to a
specialized Facilitator agent. The Facilitator agent will make decisions about which
agents are available and capable of handling sub-parts of the request, and will
manage all agent interactions required to handle the complex query. Such a
distributed agent architecture allows the construction of systems that are more
flexible and adaptable than distributed object frameworks. Individual agents can be
dynamically added to the community, extending the functionality that the agent
community can provide as a whole. The agent system is also able to adapt to
available resources in a way that hard-coded distributed objects systems can't.
4.2 Five dedicated agents in Smart Classroom
In the schematic figure of our Smart Classroom there're five dedicated agents
(except for the Facilitator agent of OAA). The Facial-voice identification agent is in
charge of the Smart Classroom's login identification and authentication. When a
person entering the room, he is required to place his face into a specific zone of a
video camera's capture range, and speak a login word. The vision-part of the agent
identifies the person by searching in a pre-trained user library, and the voice-part
authenticates the identified person by voice-based speaker recognition.
The motion-tracking agent is a computer vision-based agent. There's a pan-tilt
video camera mounted on the upper side of the front wall, monitoring the whole
range of the room. The motion-tracking agent receives video stream input from the
camera and tracks the lecturer's position and movements in the room. When lecturer
enters /leaves the teaching area, motion-tracking agent will signal the corresponding
events to the agent society.
Voice Command "
'
' ' •
Agent ^ilz-Vi Motion Track
p) Agent
Virtual Mouse
Agent
Figure 3. Five dedicated agents in OAA model
23
The voice command support of Smart Classroom is realized by a speech
recognition agent, which can perform speaker independent and continuous voice
recognition. We use IBM's simplified Chinese version of ViaVoice SDK to wrap
the voice recognition agent. The agent receives digitized signals from a wireless
microphone, which is carried by the lecturer. And then recognizes its command
within a dynamically loaded vocabulary set. Once a recognizable command is
reached, the voice recognition agent dispatches that command to the agent society.
Other corresponding agent is responsible for the execution of that command.
The Virtual Mouse agent is used for handling hand-gesture, which stimulates
the mouse events and shortcut command to activate operations on the playing
courseware. It's also a vision-based agent. There are two video cameras specialized
for virtual mouse event recognition. One is installed on top of the screen, the other
is mounted on the ceiling of the room. Through detecting and analyzing 3D
movements of hand, gestures can be recognized. The virtual mouse agent then
dispatches the recognized mouse event or shortcut command to the agent society.
Figure 4. How virtual mouse agent works
SameView agent plays a core role in our Smart Classroom's pedagogical
scenario. It is based on a legacy desktop application, namely SameView [Pei 1999,
Liao 2000, Tan 2000], which is developed by media group of our institute. The
purpose of SameView is a software for supporting multimedia based group
discussion whose members are spaciously distributed and connected by
heterogeneous networks. SameView has the following features: a shared
MediaBoard (multimedia extensions to traditional electronic whiteboard), adaptive
multimedia contents trans-coding according to terminal's network Qos and
computing power, adaptive reliable multicast in wide range of heterogeneous
24
networks, live capture of video/audio streams and multimedia events into
self-defined multimedia compound document, post-edit and playback of the
captured multimedia compound document, self-equipped authoring tools for
courseware-editing.
In our Smart Classroom, we recur to the SameView's desktop version code as
much as possible. We only revised some of its input/output user interface, such as
adding a separate Student Board for display of remote students information and
status by exploiting dual display adapter card support of Microsoft Windows
98/2000, projecting the Media Board in full-screen mode to remove the vestiges of
desktop software with Windows-style menu, toolbar, title bar, etc. The most crucial
reformation to SameView is the wrapping of it as an autonomous agent in Smart
Classroom's agent community, which enables it to receive user's natural input from
other dedicated agents like voice command recognition agent and virtual mouse
agent, and then behave interactively.
5 Conclusion: Future Goals for Smart Classroom
Our current stage Smart Classroom is a primitive prototype of futuristic
classrooms, which attempts to embody some of its distinguishing features like
natural user interface, capture of class events and collaborative support. It is still far
from a real Smart Classroom. Its resolutions to some key problems in Intelligent
Environment are simple, intuitive and somewhat application- specific. Although
many research issues need to be addressed in order to realize genuine Smart
Classroom, we stride forward the first step toward the ambitious goal. In the near
future, we'll make efforts in enhancing the Smart Classroom in some of the
following aspects.
Add more modalities and applications. We'll try to equip some more
modalities of human inputs like vision-based tracker, embedded microphone array
and various distributed sensors to sense human's context. And progress in the
sensing technologies needs to be matched by progress in applications that use
sensed information. Application is one of the key driving forces of technical
advance. We'll conceive more realistic and useful scenarios in the Smart Classroom
and also cooperate with different research groups whose application projects have
high potential to take advantage of the capability of Smart Classroom. We believe
the rise in the amount and sort of applications will enable generalization of Smart
Classroom's design and implementation.
Add a brain. The current design implementation of the Smart Classroom focus
on the human's natural input to the computing environment, the next step is to move
to a higher level and to give it the ability to understand. It is not just to utilize
multimodal interface, but also to add-on context-aware intelligence. The classroom
should be able to reason human's intention through analysis of all the gathered
25
inputs and proactively serve its occupants. There is some research studies in
reasoning human's intention based on predefined grammars [Johnston 1998] or
probabilistic statistical model. Each of them has innate weakness. We'll try to
explore the combination of them.
Add multi-user interaction. In the current stage Smart Classroom, there is
only one user (lecturer) naturally interacting with the Intelligent Environment Other
attendants are just observers or listeners and are not able to exploit the fascinating
features of natural interaction. Because a class is bound to have multiple
participants, to make a qualified Smart Classroom, we need to enhance the
classroom's support for multi-user interaction. In our next step, we'll empower the
classroom with capability to track and identify more than one user dynamically, and
enable Smart Classroom's in-place service to every user in the room.
Reference
1. [Winograd 1999].Winograd, Terry. Toward a Human-Centered Interaction
Architeture. 1999. http://www.graphics.stanford.edu/ projects/iwork/papers/
humcent/index.html
2. [Weiser 1991]. Weiser, Mark. The Compu- ter for the 21st Century. Scientific
American, pp. 94-10, September 1991. http://www.ubiq.com/hypertext/
weiser/SciAmDraft3.html
3. [Weiser 1993]. Weiser, Mark. Ubiquitous Computing. IEEE Computer "Hot
Topics", October 1993. http://www.ubiq.com/hypertext/weiser/
UbiCompHotTopics.html
4. [Weiser 1994]. Mark Weiser. The world is not a desktop. Interactions, pages
7-8, January 1994. http://www.ubiq.com/hypertext/weiser/
ACMInteractions2.html
5. [Coen 1999]. Coen, Michael. The Future Of Human-Computer Interaction or
How I learned to stop worrying and love My Intelligent Room. IEEE Intelligent
Systems. March/April. 1999.
6. [HAL 2000] MIT AI Lab HAL Project (previous Intelligent Room project),
2000. http://www.ai.mit.edu/projects/hal
7. [Mozer 1999]. Mozer, Michael C. An intelligent environment must be
adaptive. IEEE Intelligent Systems. Mar/Apr. 1999
8. [eClass 2000] Georgia Tech, eClass Project (previous Classroom 2000) 2000
http://www.cc.gatech.edu/fce/eClass/
9. [Abowd 2000]. Abowd, Gregory. Classroom 2000: An experiment with the
instrumentation of a living educational environment. IBM Systms Journal, Vol.
38. No.4
10. [Interactive Workspaces 2000]. Stanford Interactive Workspaces Project.
http://graphics.stanford.edu/projects/iwork
26
11. [Fox 2000] Fox, Armando, et al. Integrating Information Appliances into an
Interactive Workspace, IEEE CG&A, May/June 2000
12. [Aware Home 1999]. Georgia Tech, Aware Home Project,1999
http://www.cc.gatech. edu/fce/house
13. [Kidd 1999]. Kidd, Cory D., Robert J. Orr, Gregory D. Abowd, et al. The
Aware Home: A Living Laboratory for Ubiquitous Computing Research. In the
Proceedings of the Second International Workshop on Cooperative Buildings -
CoBuild'99. Position paper, October 1999.
14. [DreamSpace] IBM Research. http://www.research.ibm.com/natural/
dreamspace/index.html
15. [EasyLiving] Microsoft Research, http://www.research.microsoft.com/vision
16. [OAA]. SRI. http://www.ai.sri.com/~oaa
17. [Johnston 1998]. Johnston, Michael. Unification-based multimodal parsing. In
the Proceedings of the 17th International Conference on Computational
Linguistics and the 36th Annual Meeting of the Association for Computational
Linguistics (COLING-ACL 98), August 98, ACL Press, 624-630.
18. [Ren 2000]. Ren, Haibing, et al. Spatio-temporal appearance modeling and
recognition of continuous dynamic hand gestures. Chinese Journal of
Computers (in Chinese), 1999. Vol 23, No. 8, Agu.2000, pp.824-828.
19. [Pei 1999]. Pei, Yunzhang, Liu, Yan, Shi,Yuanchun, Xu, Guangyou. Totally
Ordered Reliable Multicast for Whiteboard Application. In proceedings of the
4th
International Workshop on CSCW in Design, Paris, France, 1999.
20. [Tan 2000]. Tan, Kun, Shi, Yuanchun, Xu, Guangyou. A practical semantic
reliable multicast architecture. In proceedings of the third international
conference on multimodal interfaces,BeiJing,China,2000
21. [Liao 2000]. Liao, Chunyuan, Shi, Yuanchun, Xu, Guangyou. AMTM - An
Adaptive Multimedia Transport Model. In proceeding of SPIE International
Symposia on Voice, Video and Data Communication, Boston, Nov. 5-8, 2000.
H Y B R I D JINI F O R L I M I T E D D E V I C E S
V I N C E N T LENDERS, POLLY HUANG AND MEN MUHEIM
ETH Zurich
E-mail: {lenders, huang}@tik.ee.ethz.ch, men@ife.ee.ethz.ch
We envision a future of heterogeneous mobile devices collaborating spontaneously
and bringing convenience to life. Taking a practical approach, we study the feasi-
bility of integrating limited devices into the Jini, Java, and Linux paradigm. With
careful evaluation and system hacking, we manage to fit the software stack, ex-
cluding Java's Remote Method Invocation (RMI) support, in a small 1.85-Mbyte
space. However, we also identify that including RMI support will exhaust all
the remaining space. We propose, as a short-term solution, to re-implement Jini
with light-weight communication alternatives and to use a hybrid lookup server to
inter-operate RMI- and non-RMI-supported devices. For the long term, we advo-
cate minimalism and call for community-wide standardization effort to the system
software development.
1 Introduction
We envision a future that computers and electronics will be mobile and collab-
orate spontaneously, bringing convenience to life. Two immediate problems
before realizing such a future are ways to handle heterogeneity and mobility
of these devices. These devices, for example mini-laptops, mobile phones, and
home appliances have very distinct hardware and software profiles. The task
of configuring and inter-operating them will be too difficult for average users,
not to mention that these devices are likely to be mobile and whenever they
enter a new environment they need to be re-configured.
To counter the problems of automatic configuration and seamless inter-
operation, the industry and research community have offered a few solu-
tions 1>2
that encompass (1) a resource discovery/management protocol and
(2) a framework of uniform programming interface and code base. One promi-
nent example is the Jini 3
and Java 4
combination. In the Jini/Java paradigm,
devices can come and discover (or be discovered by) resource in the network
automatically. While responding, the devices register proxies allowing other
members in the network to operate them.
As a feasibility study, we are building such a Jini/Java-based spontaneous
network with various types of devices, mainly full-fledged computers, mobile
PCs, and limited electronics. Connecting limited electronics is the most inter-
esting and challenging case. By limited electronics, we mean personal, home,
or office electronics. They are essentially micro-computers with compact sys-
27
28
tem architectures and limited flash memory, and sometimes also referred to
as embedded systems.
Taking a hands-on approach, we set ourselves off to install the Jini/Java
stack on a development board for embedded systems. This turns out to be
a non-trivial task and gives rise to a serious system software problem - its
size. It is profoundly difficult just to fit a native Jini/Java/Linux stack onto
a typical embedded system board, not to mention extra applications required
to run on top of the system stack.
After intensive system hacking and careful evaluation, we find bottleneck
of the size problem being Java's Remote Method Invocation (RMI) support.
It is humongous, relatively to other parts, and current implementation of Jini
depends on it. While RMI offers elaborated remote execution support, it is
not really necessary for communication in Jini which can be rather primitive.
We propose, as a solution to scale system software size, a light-weight Jini
implementation based on IP socket or XML. That is to implement Jini without
using any RMI interfaces and avoid including RMI support in the software
stack at all. To warrant backward compatibility with existing implementation,
we take a hybrid approach to differentiate existing RMI-based and the light-
weight implementations, thus enabling execution of non-RMI proxies on RMI-
supported devices but not the other way around.
More importantly, we call for standardization activities towards defining
minimum system software stack for mobile devices. In the meantime, we
urge developers to refrain from RMI and the community to re-examine its
scalability.
In short, our contribution includes a) a successful port of system kernel
and free-license VM for limited devices, b) a qualitative and quantitative eval-
uation of a minimum software stack, c) a 35% reduction of the Jini/Java/Linux
stack without RMI support to 1.85 Mbytes, and d) a light-weight hybrid Jini
solution to overcome the system software size problem.
2 Approach
Jini devices require hardware platforms with network connectivity and the
ability to execute Java code. Two different minimal hardware approaches are
possible. The first solution is an embedded device with network connectivity
that runs a Java Virtual Machine (VM) on top of any kind of operating system.
Typical embedded devices of this kind are the Developer Board LX from Axis 5
and the NetSC520 Demonstration Platform from AMD 6
. Both platforms run
embedded Linux and communicate via Ethernet. The second solution is to use
embedded boards with Java processors. Unlike traditional microprocessors,
29
which must convert Java byte-code into the processor's native language, these
processors can operate directly from Java byte-code. aJile Systems 7
provides
a development board with their Java processor called aJile. Another solution
is provided by Systronix 8
. They developed a hardware Java platform with
their Tiny Network Module (TINI).
We decided to use the Developer Board LX from Axis for our further
implementations. This board provides the best scalability regarding resources,
size, and price. It has the following features: 100MIPS 32 bit CPU, Ethernet
10/100Mbps, 2 RS-232 serial ports, 2 parallel ports, 2 Mbyte FLASH and 8
Mbyte DRAM. The FLASH size can be updated to 4 Mbytes.
Operating Jini on this platform with restricted resources requires strict
size limitations regarding the operating system and the VM. Linux suits well
as target operating system for our device. The two main reasons are the
compact size of Linux and its open license policy. We use a Linux port as
operating system.
Different Java versions from different parties are candidates to be ported
to the developer board. Sun Microsystems introduces the Java 2 Micro Edi-
tion (J2ME) 9
as Java platform for limited devices. J2ME is divided in two
complementary configurations: the Connected Limited Device Configuration
(CLDC) and the Connected Device Configuration (CDC). Both configurations
introduce a new VM. The CDC contains the C virtual machine (CVM) and
the CLDC contains the K virtual machine (KVM). CLDC would probably
better suit for the developer board.
Kaffe 10
is an open implementation of Java for embedded and desktop
systems. It is an implementation of the PersonalJava 3.0 specification and re-
quires no source code licenses from Sun Microsystems. The major advantages
of Kaffe are: compact size, easiness of porting to new platforms (operating
systems and architecture), and it is open source software. For these reasons,
we decided to use Kaffe instead of J2ME for our implementation.
3 Evaluation
The main task of this work is to fit the required software on the 4-Mbyte
FLASH ROM. The required software includes the operating system, VM, Jini
core classes and Jini service classes.
Embedded Linux. The CPU on the developer board is the ETRAX 100
LX. The source code of Linux 2.4 includes the CRIS architecture for ETRAX
100 LX. Axis provides a small distribution of Linux for their developer board.
We have optimized this distribution and reduced the size of the operating
system (kernel and basic utilities) to 800 Kbytes (55 % of the original size).
Other documents randomly have
different content
It. to Robert Bageley pryor vjli.
It. to Henry Benett vjli.
It. to George Farny vjli.
It. to Rauffe Motsett cvjs.
viijd.
It. to Randall Barnes cvjs.
viijd.
It. to Willm Crosse cvjs.
viijd.
It. to Robt. Cheryngtoun cvjs.
viijd.
It. to Edmund Boultoun cs.
It. to Willm prowluffe cs.
It. to Thomas loke xls.
It. to Rychard Cordon xls.
It. to John Bykertoun xls.
Summa cxvli.
vjs.
viijd.
Fees and Annuites graunted owt by Couent sealle before the dyssolucon of the
seid late Monastery
Fyrst to my lorde of Darby stuard of the seid Monastery & the towne and
maner of loke
xls.
It. to Rychard Grosuenour stuard of pultoun xxvjs.
viijd.
It. to Vmfrey Witney Balyffe of all the lorsheppes & Maners belonging to
the seid Monastery
Wythin the Countye of Chester
lxvjs.
viijd.
It. to Willm Damport Balyff of all the lordshyppes & maners of the seid
late Mon. in the Countye of Stafford except the Toune of loke
iiijli.
It. to Robt. Burgh forester of the forest of loke belongyng to the seid late
Monastery
[sic]
It. to John Cordoun Balyffe of the toune of loke xxs.
It. to John Alynn Balyff of Rassall Norbroke & bysshopham xxvjs.
viijd.
It. to Richard Dann late stuard of housholde ther lxs.
It. to Henry Beretoun xls.
It. to Roger Williamson xxvjs.
viijd.
It. to laurence plunte xxs.
It. to John Wytney xxvjs.
viijd.
It. to Robt. Warmyngton xls.
It. to Thomas Wytney xxvjs.
viijd.
It. to Jamys Coke xxs.
It. to William Halme xiijs.
iiijd.
It. to Thomas Redhed xls.
It. to Jamys Statheham xls.
It. to Nycholas Witney lxvjs.
viijd.
Summa xxxiiij
li.
Dettes owyng by the seid late abbot to diuers psons as folowyth
Fyrst to Henry Hargraues of luddyngtoun xxixli. iiijd.
It. to Elyzabeth Alenn of Rossall xxijli.
It. to John Alenn of Rossall iiijli.
It. to the Wydow Amrye of londin vjli.
It. to Helyn fitton of Sidingtoun xvjli. xiijs. iiijd.
It. to Robt. Burgh for oulde dette lxixs. ixd.
It. to Thomas Heth viijli. vjs. viijd.
It. to Robt. Myddeltoun of Islyngtoun xxxs.
It. to Thomas Maynewaryng of londondon [sic] xxvjs viijd
It. to Thomas Ball of Chester xlvjs viijd
It. to Jamys Colyar viijli. xvs. vijd.
It. to Robt. Wandell lxvjs. viijd.
It. to Willim Nyckted person of Rollestoun xlvjs. viijd.
It. to John lokker chepelleyn of ypstons xxxvs. viijd.
It. to Willm Heth of parkelown xvs.
It. to Roger Williamson iiijli.
It. to John Higgenboth xxviijs. iiijd.
It. to John gudwyn Chapelayne of Chedton iijs. iiijd.
It. to Hery bennett vjli. xiijs. iiijd.
It. to Thomas Hattoun xliiijs.
It. to Richard Hyggenbothe xvs. vjd.
It. to John Cheryngton xls.
It. to the pisshionors of Sandbath vjli.
It. to Willm Dauenport xxvs.
It. to Vmfrey Reynould ciijs. iiijd.
It. to John Hale iijs.
It. to Richard Vygors xvjs.
It. to John Wood xxiijs.
It. to Roger Tatton xs.
It. to John Fayrfeld xijs. iiijd.
It. to Hugh palenn ixs.
It. to Henry Symson viijs.
It. to Rychard Hergreues xxxjs. viijd.
It. to John Feny ixs. viijd.
It. to Thomas Cattoun ijs.
It. to James Coke xlviijs. ix d.
It. to Xpofer Crowther iijs. iiijd.
It. to Edward plummer vijs. iiijd.
It. to Jamys Vygors taylor xiijs. xjd.
It. to Willm Rame of Newboulte xli.
It. to Sr. Thomas Arundell Knyght liijs. iiijd.
It. to Sr. Robt. Nedham Knyght xxxiijs. iiijd.
It. to Robt. Warmingtoun for hys fee xxs.
It. to Dan Wllm Crosse xls.
It. to Willm feni lxs.
Summa clxxjli. xs. vjd.
Wireless LANs 1st Edition Benny Bing 2024 scribd download
APPENDIX VI
THE SALE OF THE GOODS AT THE GREY FRIARS, STAFFORD
(British Museum, Addit. MS. No. 11,041, fol. 86b)
The Grey
ffryers
of Staff.
surrendryd
The Sale of goodes ther made the xxvijth day of September, anno
xxxmo. Henrici viijui ., as herafter followyth
Kechyn
Sol. Fyrst, sold to the warden of the seyd fryers ij brasse pottes viijs.
Sol. Item, ij brasse pottes, sold to Edward Scudamour iiijs
Sol. Item, sold to the towene of Stafford ij Church candelstyckes vs.
Sol.
Item, sold to the seyd Scudamour ij coberds, (xiid.); a cobert;
a spytt, (vid.); and a tryvett
xviijd.
Sol. Item, sold to the wardene vj platters ijs.
Sol.
Item, a fryeng panne (iiijd.) and a peyre (ijd.) of pothangles,
sold to the seyd Scudamour
vjd.
Sol. Item, ij pannes, sold to ... vid.
Sol. Item, sold to the bayliff of Staff. a potthangles viij. d.
Summa xxijs. ijd.
Butterie
Sol. Item, sold to Doryngton, a gret basen xxd.
Summa patet
Churche
Sol. Item, a cope of tawny damaske xijd.
Sol.
Item, a vestment and ij tynakles of old prest velvet, sold to
John Savage baylyf
xiijd. iiijd.
Sol. Item, sold to Thomas Williams ij copes of redd tartarne xiid.
Sol. Item, a sute of blue sarcenet, sold to Thomas Cradock iijs. iiijd.
Sol. Item, a sute of grene branchyd sylk, sold to Mr. Offeley vj. viijd.
Sol. Item, ij tynakles of dunne sylk, sold to Pereson xxd.
Sol. Item, ij auter clothes, sold to Robert Doryngton xijd.
Sol. Item, a cope of lynyn cloth steynyd, sold to a fryer iiijd.
Sol. Item, ij table clothes, sold to John a Lee vjd
Sol. Item, ij corperas casys, sold to the prior iiijd.
Sol.
Item, a corperas, sold to the
wardens of the churche
iiijd.
Sol. Item, sold to William Bentrey a stremer of lynyn clothe iiijd.
Sol.
Item, a vestment of blue fustian and one of whyt diaper, sold
to fryere
Wood
vjd.
Sol.
Item, a sute of vestmentes of yolowe say, sold to Edward
Rogers
xijd.
Sol.
Item, sold to John Webbe the tymber worke in the hyegh
quyer, and a auter of alablaster in the body of the churche
ixs. viijd.
Sol. Item, sold to Rychard Lees all the setes vjd.
Sol.
Item, a table of allablaster standyng in the church, sold to Mr.
Loveson
ijs. viijd.
Sol.
Item in Seynt Fraunces chapelle all the seates, sold to Robert
Doryngton
iiijd.
Sol. Item, a image of Seynt Katerine, sold to ... Lee vjd.
Sol.
Item, sold to Robert Doryngton, old bokes and a cofer in the
library
ijs.
Sol. Item, sold a old peyre of portatyffe organs to Mr. Lvsun ijs.
Sol. Item, an old cofer, in the vestry, sold to Janys Clement ijs. viijd.
Sol. Item, old wexe, sold to Robert Doryngton iiijd.
Sol. Item, a lampe, sold to Robert Doryngton viijd.
Sol. Item, old bokes in the vestry, sold to the same Robert viijd.
Sol. Item, sold to Robert Whytgreve, a missale viijd.
Sol.
Item, ij aulter candelstyckes and a pykes of copper, sold to
Mr. Swynnerton
xijd.
Sol. Item, a bere franke, sold to ... ijd.
Summa lvs. viijd.
Bruehouse
Sol.
Item, sold to the vnder baylyff and to the late warden of the
Fryers iij leades, one to brue in, and ij to kele in, fates,[246] iiij
tubbes, a bultyng hutche, and a knedyng trowghe
xiiijs.
viijd.
Sol.
Item, ij peces of tymber lyeng in the bruehouse, sold to
Bagnoll
iiijd.
Summa xvs.
Hall
Sol.
Item, a table on the north syde of the hall sold to Robert
Danes
xvjd.
Sol.
Item, sold to the hyeghe baylyff, the table on the sowth syde
of the hall
xvjd.
Sol. Item, sold to Robert Wetwood, the table at the hyeghe deske viijd.
Summa iijs. iiijd.
Buyldynges
Item, sold to Jamys Lusone esquyer all the church and quyer,
with all edyfyenges and buyldynges within the precinct of the
Fryers Minours surrendryd, with all the stone, tymber, tyle,
glasse, and iron in the same, ledd and belles only exceptyd,
and also exceptyd and reservyd the stone wall next unto the
towne of Stafford
xxixli.
xxd. pro.
qua
quidem
summa
prefatus
Jacobus
obligat.
inter al.
ad
solvend.
ad fest.
Pur.
beate
Marie
et
Nativitat.
sancti
Johannis
equal.
Sol.
Item, sold to the towneshyp, the wall of the Fryers next unto
the towne
iijs. iiijd.
Summa xxixli. vs.
Sum of all the goodes
and buyldynges of the seyd ffryers
sold
xxxiiijli. iijs.
xd.
R’ by John
Scudamour
esquyer, r.
cjs. ijd.
Item, ij belles, one a sauncebelle,[247] the other by estimation Xcth, in the
custodye of Mr. Luson.
Item, in ledd upon the quyer and a chapelle by estimation xlv. fotes brode of
bothe sydes and xliij fotes long, in the custody of baylyffes of Stafford.
Wireless LANs 1st Edition Benny Bing 2024 scribd download
APPENDIX VII
THE SALE OF THE GOODS AT THE AUSTIN FRIARS, STAFFORD
(British Museum, Addit. MS. No. 11,041, fol. 87b)
The
Austen
Fryers of
Staff.
The sales of goodes ther made the xxvijth day of September, anno
xxxmo Regis Henrici viij.
Church
Sol. Fyrst, sold to Mr. Whytgreve, a masse boke xijd.
Sol. Item, a cope of blake chamlett, sold ijs.
R.B.
Item, a vestment and ij tynaklez of blake say with
albes and amyses, etc., sold to Richard Ward
iiijs.
R.B.
Item, a vestment and ij tynakles of tawny sarcenett,
sold to ...
iiijs.
R.B.
Item, a vestment and ij tynakles without albes of
bawdekyn with images of our lady, sold to Mr. Luson
xviijd.
R.B.
Item, ij tynakles with albes, bawdekyn with bryddes,
sold to ... Affley
iijs. iiijd.
R.B.
Item, a syngle vestment with a albe and a blake
orferuns, sold
xxd.
R.B. Item, a vestment of redd fustyan with ij albes ijs. viijd.
Sol.
Item, ij old copes, one of grene and another of old
badkyn parke worke
ijs.
R.B.
Item, ij copes grene and yolowe partye Colowryd
and rewyd, sold to Mr. Luson
xxijd.
R.B. Item, iiij corperas casys viijd.
R.B. Item, a peyre of censours, sold to Thomas Browne iiijd.
R.B. Item, a vestment of white bustion, sold to the prior viijd.
I.S. Item, ij candelstyckes xvjd.
I.S. Item, a alter cloth viijd.
I.S. Item, old bokes in the quyer vjd.
R.B. Item, a pulpytt iiijd.
I.S. Item, ij ladders viijd.
R.B.
Item, a table of alablaster (iijs. viijd.) and a dore
(iiijd) sold to Mr.
Stamford
iiijs.
R.B. Item, the hyegh alter, sold to Mr. Stamford iijs.
R.B.
Item, the bordes of the altar of the northe syde of
the church
viijd.
I.S. Item, ij grave stones of alablast, sold to ... Wolrych xijd.
I.S. Item, the organs, sold to Mr. Offeley xxvjs. viijd.
Hall
I.S. Item, a table in the old hall with ij trestylles iiijd.
R.B.
Item, a table in the inner hall, with ij trestylles and ij
formes, sold to Robert Doryngton
viijd.
Bruehouse
R.B. Item, a bultyng table, sold to Margarett Whytfyld ijd.
R.B. Item, a furnes of ledd, sold to Mr. Stamford vjs.
Kechyn
I.S. Item, a great pot and a lesse iijs. iiijd.
R.B. Item, iij pannes of brasse ijs. viijd.
R.B. Item, iij platters, a dysshe, and a sawecere xijd.
R.B. Item, a trevett iiijd.
Summa lxxixs.
Buyldynges.
rec.
xls.
Item, sold to Jamys Loveson esquyer, Thomas
Picto, and Richard Warde, all the tyle, shyngle,
tymber, stone, glasse and iron, one marble graue
stone, the pauementes of the church, quyer, and
chapelles, with rode lofte, the pyctures of Cryst,
Mary and John, beyng in the church and chauncell
of the Austen Fryers, besydes the towne of Stafford,
surrendryd with all other superfluos edyfyes and
buyldynges within the precynct of the seyd Fryers,
to be takyn downe, defacyd, and caryed awey by
the seyd Loveson, Picto, and Ward, at there owne
proper costes and charges, and to pay for all the
premysses to the Kyng and hys heyres, successors
and assignes
xxviijli. viijs. iiijd.
Inde sol. pro
Picto
xls. et rem. xxvjl.
viijs. iiijd. pro qua
quidem summa
Jacobus Loveson
de
Woleverhampton.
Ar. obligat.
inter al. ad
solvend.ad
fest.>br>Pur.
beate Marie
virginis et Nat.
Sancti Johannis
prox. equal. ut
patet obligac.
dat.
Sept. anno
xxxmo.
regis enrici viij
rem. cum J.
Scudamour ar.
rec.
partic.
Sum of all the goodes and edyfyenges forseyd in
the Austen Fryres sold
xxxij. vjs.
viijd.
Rec. per J. S.
cxviijs.
Super. pro
edific.
xxvjli. viijs.
iiijd.
Item, there remaynyth in the custodye of Robert Burgoyne, audytour,
one playne crosse of copper, with a lytle image of Cryst sylver apon hyt,
iijs.
iiijd.
worth by estimation
Item, remaynyth in the custodye of John Scudamore esquyer, particuler
receivor etc., one lytle woodden crosse platyd over verry thyn with
sylver, worth by estimation
xijd.
Item, ther remaynyth in the steple one belle, by estimation x Cth in the
custodye of Thomas Picto, worth by estimation
viijli.
Item, one lytle belle in the steple, weyng by estimation di. Cth, worth by
estimation
viijs.
Wireless LANs 1st Edition Benny Bing 2024 scribd download
APPENDIX VIII
THE SALE OF THE GOODS OF THE GREY FRIARS, LICHFIELD
(British Museum, Addit. MS. No. 11,041, fol. 88b)
Prisours
Robert Ryve
William Colman
Marke Wyrley
Thomas Fanne
jurati.
Grey
Fryers
of
Lychefyld
The Sales ther made the iiijth day of October, anno xxxo regis
Henrici viijui
Sol.
ffyrst sold to Mr. Strete all the copes, vestments, and
tynakles in gros for
xls.
Sol.
Item, sold to the seyd Mr. Strete ij > candelstyckes of
latten
viijd.
Sol.
Item, the pauyng tyle in both the cloysters, sold to Mr.
Strete
xls.
Sol. Item, sold to Thomas Bardell, ij candelstykes viijd.
Sol.
Item, sold to Sir Thomas Dobsone, a presse, a
bedstede, and a dore
iiijd.
Sol.
Item, the tymber, tyle, and stone of the old hostery and
the ffermery, sold
to Rychard Rawson
iiijli.
Sol.
Item, the tyle and tymber of the lytle cloyster, sold to
John ap Gl’m.
xiijs. iiijd.
Sol. Item, ij worte leddes[248] in the bruehouse, sold to John
Sandelond
vjs. viiijd.
Sol. Item, sold to Mr. Aston, a wynd ijs.
Sol.
Item, sold to Thomas Fanne, the brycke wall at the
churche ende
ijs.
Sol.
Item, sold to the master of the Ile, > a fate in the
bruehouse
iiijd.
Sol. Item, sold to Chapman, a fate xijd.
Item, sold to John Genynges, the tymber, tyle, and
stone of the stable
buttyng upon the churche ende
iiijli.
Item, sold to John Mylward, the tymber, tyle, and stone
of the iij houses joynyng together in the court callyd the
Tenys Court
xls.
Item, sold to Rychard Ballard, the lytle house over the
ovyn
iijs. iiijd.
Item, sold to Mr. Ryce, mastres Warden, mastres
Stonye, vij leddes
for wort
xviijs.
Item, the tymber, tyle, and stone of the kechyn and the
bruehouse, sold to Edward Spratte
liijs. iiijd.
Item, sold to John Laughton, a cofere and a hutche in
the buttery
xijd.
Item, the cesterne of ledd, and the stone that hyt
standyth in, in the kechyn, sold to John Genynges
xiijs. iiijd.
Item, the glasse that ys lewse in the newe loggyng, sold
to William Colman
iijs.
Item, a lampe, sold to Edmund Bardell viijd.
Item, the presse in the vestrye, sold to the warden of the
gyld
xvjd.
Item, ij hutches, sold to Mr. Warden viijd.
Item, a fryers masse boke, solde to Marke Wyrley iiijd.
Item, the stone wall betwene the old ostery and the
ffrater, sold to John Sadeler
vs.
Item, the pauement of the quyere, sold to Mr. Stretes xiijs. iiijd.
Item the fryers setes in the quyere, sold to John
Laughton
vjs. viijd.
Item, the cundyt of ledd in the cloyster, sold to the
master of the gyld and his brethern
xxxs.
Sol. Item, a holy water stocke, sold to John Howlat xxd.
Sol.
Item, all the kechyn stuff, sold to master warden of the
gyld
xxs.
Sol.
Item, ij standert candelstyckes, sold to the seyd master
warden
viijs.
Sol.
Item, the lytle cundyt standyng at the revestrye dore,
sold to George Stonyng
vs.
Sol.
Item, the cesterne of ledd standyng in the porche at the
Tenys Court ende, sold to Mr. Lytleton
xxs.
Sol.
Item, a lytle porche standyng by the dwellyng house,
sold to Mr. Lytylton
xs.
recepi
xxjli.
iijs.
iiijd.
Item, the ffrayter and the chambers stretchyng to the
kechyn, with all the quadrant of the inner cloyster
joynyng to the church and steple, and the church and
quyer, and the long newe house of the est syde of the
same cloyster, except and reseruyd ledd, belles,
pauement, and grauestones within all the seyd
buyldynges, save only the pauement of the seyd
churche, whyche ys parcell of the seyd bargayne, sold
to John Weston of Lichfeld, John Archer, Richard Cotes,
gent., Hugh Bowde, Harry Hopwood draper, Michaell
Hyll, John Genynges and John Mylward, and hath day
to deface the steple, cloyster, and quyer forthwyth the
churche, onles they obtayne lycens otherwyse of the
Kyng and hys councell, athys-side the feast of the
Purification of our Lady next commyng, and for all the
residewe of the buyldynges iij yeres day[249] to pull
xlijli. xiijs.
iiijd.
Inde sol. J.
S.
xxjli. iijs.
iiijd.
Et rem.
xxjli. xs.
pro qua
quidem
summa
Johannes
Weston,
Johannes
Archer,
Ricardus
Cotes et
downe and carye awey, and to have egresse and
regresse for the same
Hugo
Bowde,
obligat.
ad sol. ad
fest.
sancti
Michaelis
archangeli
prox.
ut patet
oblig.
dat. quinto
die
Octobr.
anno
regni regis
Henrici
viijui. xxx.
rem. cum
Johanne
Scudamour,
ar. r. partic.
etc.
Wireless LANs 1st Edition Benny Bing 2024 scribd download
APPENDIX IX
THE SALE OF GOODS AT CROXDEN ABBEY
(British Museum, Addit. MS. No. 11,041, fol. 89b)
Crokesden—The sales ther made the xvth day of October, anno xxxo
regis Henrici viijui as herafter followyth:
Sol.
Item, a lytle gatehouse on the north syde of the comyn wey,
sold to Mr. Bassett
xiijs.
iiijd.
Sol. Item, sold to Mr. Bassett, the loft under the organs xs.
Sol.
Item, sold to Mr. Bassett, the lytle smythes forge iiijs.
viijd.
Sol. Item, the bott of an asshe sold xxd.
Sol.
Item, the roffe of the churche, sold to Sir Thomas Gylbert
and Edmund Wetheryns of Chekeley parysshe
vjli.
r.
xxxiijs.
Item, the roffe of the dorter,[250] sold to Mr. Bassett xxxiijs.
iiijd.
Sol.
Item, sold to John Ferne, all the old tymber in the cloyster vjs.
viijd.
Summa, ixli. ixs. viijd. oneratur.
Welcome to our website – the ideal destination for book lovers and
knowledge seekers. With a mission to inspire endlessly, we offer a
vast collection of books, ranging from classic literary works to
specialized publications, self-development books, and children's
literature. Each book is a new journey of discovery, expanding
knowledge and enriching the soul of the reade
Our website is not just a platform for buying books, but a bridge
connecting readers to the timeless values of culture and wisdom. With
an elegant, user-friendly interface and an intelligent search system,
we are committed to providing a quick and convenient shopping
experience. Additionally, our special promotions and home delivery
services ensure that you save time and fully enjoy the joy of reading.
Let us accompany you on the journey of exploring knowledge and
personal growth!
ebookultra.com

More Related Content

PDF
Download full ebook of Wireless LANs 1st Edition Benny Bing instant download pdf
PDF
Download full ebook of Wireless LANs 1st Edition Benny Bing instant download pdf
PDF
Download full ebook of Wireless LANs 1st Edition Benny Bing instant download pdf
PDF
Networking And Mobile Computing Third International Conference Iccnmc 2005 Zh...
PDF
Fourth generation Wireless Networks Applications and Innovations 1st Edition ...
PDF
Network And Parallel Computing 9th Ifip International Conference Npc 2012 Gwa...
PDF
Computer Networking: A Top-Down Approach 8th Edition James F. Kurose
PDF
IEEE GLOBECOM'14 Industry Program
Download full ebook of Wireless LANs 1st Edition Benny Bing instant download pdf
Download full ebook of Wireless LANs 1st Edition Benny Bing instant download pdf
Download full ebook of Wireless LANs 1st Edition Benny Bing instant download pdf
Networking And Mobile Computing Third International Conference Iccnmc 2005 Zh...
Fourth generation Wireless Networks Applications and Innovations 1st Edition ...
Network And Parallel Computing 9th Ifip International Conference Npc 2012 Gwa...
Computer Networking: A Top-Down Approach 8th Edition James F. Kurose
IEEE GLOBECOM'14 Industry Program

Similar to Wireless LANs 1st Edition Benny Bing 2024 scribd download (20)

PDF
Wireless Algorithms Systems And Applications 6th International Conference Was...
PDF
Streaming Media Architectures Techniques And Applications Recent Advances Ce Zhu
PDF
802. 11A Standard Essay
PDF
Advanced Internet Services And Applications First International Workshop Aisa...
PDF
2009 International Conference on Mobile Hybrid and On line Learning El ml 200...
PDF
Computer Networking: A Top-Down Approach 8th Edition James F. Kurose
PDF
Download full ebook of Deploying wireless networks Wilton A. instant download...
PDF
Technological breakthroughs in modern wireless sensor applications 1st Editio...
PDF
Wireless Communications And Ntwks Recent Advs A Eksim
PDF
Bq4301381388
PDF
Information Networking Towards Ubiquitous Networking And Services Internation...
PDF
Technological breakthroughs in modern wireless sensor applications 1st Editio...
PDF
Bcit Citx1150 Structured Cabling Systems For Computer Networks Advanced Cabli...
PDF
Wiredwireless Internet Communications 5th International Conference Wwic 2007 ...
PDF
Download full ebook of Deploying wireless networks Wilton A. instant download...
PDF
Computer_Networking_A_Top-Down_Approach_6th_edition_ (2).pdf
PDF
Ubiquitous Convergence Technology First International Conference Icuct 2006 J...
PDF
computer networking from the point of view of the network administrator..pdf
PDF
Wireless Communication Network Technology and Evolution First Edition Shilin ...
PDF
Big Data Technologies and Applications: 10th EAI International Conference, BD...
Wireless Algorithms Systems And Applications 6th International Conference Was...
Streaming Media Architectures Techniques And Applications Recent Advances Ce Zhu
802. 11A Standard Essay
Advanced Internet Services And Applications First International Workshop Aisa...
2009 International Conference on Mobile Hybrid and On line Learning El ml 200...
Computer Networking: A Top-Down Approach 8th Edition James F. Kurose
Download full ebook of Deploying wireless networks Wilton A. instant download...
Technological breakthroughs in modern wireless sensor applications 1st Editio...
Wireless Communications And Ntwks Recent Advs A Eksim
Bq4301381388
Information Networking Towards Ubiquitous Networking And Services Internation...
Technological breakthroughs in modern wireless sensor applications 1st Editio...
Bcit Citx1150 Structured Cabling Systems For Computer Networks Advanced Cabli...
Wiredwireless Internet Communications 5th International Conference Wwic 2007 ...
Download full ebook of Deploying wireless networks Wilton A. instant download...
Computer_Networking_A_Top-Down_Approach_6th_edition_ (2).pdf
Ubiquitous Convergence Technology First International Conference Icuct 2006 J...
computer networking from the point of view of the network administrator..pdf
Wireless Communication Network Technology and Evolution First Edition Shilin ...
Big Data Technologies and Applications: 10th EAI International Conference, BD...
Ad

Recently uploaded (20)

PDF
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
PDF
O7-L3 Supply Chain Operations - ICLT Program
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PPTX
master seminar digital applications in india
PDF
RMMM.pdf make it easy to upload and study
PDF
VCE English Exam - Section C Student Revision Booklet
PDF
GENETICS IN BIOLOGY IN SECONDARY LEVEL FORM 3
PPTX
GDM (1) (1).pptx small presentation for students
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PPTX
Introduction-to-Literarature-and-Literary-Studies-week-Prelim-coverage.pptx
PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PPTX
Lesson notes of climatology university.
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PDF
Computing-Curriculum for Schools in Ghana
PPTX
202450812 BayCHI UCSC-SV 20250812 v17.pptx
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
O7-L3 Supply Chain Operations - ICLT Program
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
master seminar digital applications in india
RMMM.pdf make it easy to upload and study
VCE English Exam - Section C Student Revision Booklet
GENETICS IN BIOLOGY IN SECONDARY LEVEL FORM 3
GDM (1) (1).pptx small presentation for students
Final Presentation General Medicine 03-08-2024.pptx
STATICS OF THE RIGID BODIES Hibbelers.pdf
Introduction-to-Literarature-and-Literary-Studies-week-Prelim-coverage.pptx
Pharmacology of Heart Failure /Pharmacotherapy of CHF
Module 4: Burden of Disease Tutorial Slides S2 2025
Lesson notes of climatology university.
O5-L3 Freight Transport Ops (International) V1.pdf
Final Presentation General Medicine 03-08-2024.pptx
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
Computing-Curriculum for Schools in Ghana
202450812 BayCHI UCSC-SV 20250812 v17.pptx
human mycosis Human fungal infections are called human mycosis..pptx
Ad

Wireless LANs 1st Edition Benny Bing 2024 scribd download

  • 1. Download the full version of the ebook now at ebookultra.com Wireless LANs 1st Edition Benny Bing https://ebookultra.com/download/wireless-lans-1st- edition-benny-bing/ Explore and download more ebook at https://ebookultra.com
  • 2. Recommended digital products (PDF, EPUB, MOBI) that you can download immediately if you are interested. 3D and HD Broadband Video Networking 1st Edition Benny Bing https://ebookultra.com/download/3d-and-hd-broadband-video- networking-1st-edition-benny-bing/ ebookultra.com Charging for Mobile All IP Telecommunications Wireless Communications and Mobile Computing 1st Edition Yi-Bing Lin https://ebookultra.com/download/charging-for-mobile-all-ip- telecommunications-wireless-communications-and-mobile-computing-1st- edition-yi-bing-lin/ ebookultra.com Learning Bing Maps API 1st Edition Sinani https://ebookultra.com/download/learning-bing-maps-api-1st-edition- sinani/ ebookultra.com Practical Network Design Techniques A Complete Guide For WANs and LANs Second Edition Gilbert Held https://ebookultra.com/download/practical-network-design-techniques-a- complete-guide-for-wans-and-lans-second-edition-gilbert-held/ ebookultra.com
  • 3. Problems of number theory in mathematical competitions 1st published, repr. Edition Hong-Bing Yu https://ebookultra.com/download/problems-of-number-theory-in- mathematical-competitions-1st-published-repr-edition-hong-bing-yu/ ebookultra.com Physics of Continuous Matter Exotic and Everyday Phenomena in the Macroscopic World 1st Edition Benny Lautrup https://ebookultra.com/download/physics-of-continuous-matter-exotic- and-everyday-phenomena-in-the-macroscopic-world-1st-edition-benny- lautrup/ ebookultra.com Wireless Security 1st Edition Merritt Maxim https://ebookultra.com/download/wireless-security-1st-edition-merritt- maxim/ ebookultra.com Wireless Data Demystified 1st Edition John Vacca https://ebookultra.com/download/wireless-data-demystified-1st-edition- john-vacca/ ebookultra.com Hacking Wireless Networks 1st Edition Andreas Kolokithas https://ebookultra.com/download/hacking-wireless-networks-1st-edition- andreas-kolokithas/ ebookultra.com
  • 5. Wireless LANs 1st Edition Benny Bing Digital Instant Download Author(s): Benny Bing ISBN(s): 9789812799562, 9812799567 Edition: 1st File Details: PDF, 15.69 MB Year: 2002 Language: english
  • 6. INTERNET IEEE International Conference on Wireless LANs and Home Networks
  • 9. WirelessLANsandHomeNetworks Connecting Offices and Homes Proceedings of the International Conference on Wireless LANs and Home Networks Singapore 5-7 December 2001 Editor Benny Bing Georgia Institute of Technology, USA Technical Co-Sponsors IEEE Communications Society V f e World Scientific WW NewJersey London'Singapore* NewJersey •London • Singapore •Hong Kong
  • 10. Published by World Scientific Publishing Co. Pte. Ltd. P O Box 128, Farrer Road, Singapore 912805 USA office: Suite IB, 1060 Main Street, River Edge, NJ 07661 UK office: 57 Shelton Street, Covent Garden, London WC2H 9HE British Library Cataloguing-in-Publication Data A catalogue record for this book is available from the British Library. Cover design: Illustrates the importance of wireless LANs in the mobile Internet infrastructure. IEEE International Conference on WIRELESS LANS AND HOME NETWORKS Copyright © 2001 by World Scientific Publishing Co. Pte. Ltd. All rights reserved. This book, or parts thereof, may not be reproduced in anyform or by any means, electronic or mechanical, includingphotocopying, recording or any information storage and retrieval system now known or to be invented, without written permission from the Publisher. For photocopying of material in this volume, please pay a copying fee through the Copyright Clearance Center, Inc., 222 Rosewood Drive, Danvers, MA 01923, USA. In this case permission to photocopy is not required from the publisher. ISBN 981-02-4826-1 Printed in Singapore by World Scientific Printers (S) Pte Ltd
  • 11. - Platinum Sponsor Cisco SYSTEMS EMPOWERING THE INTERNET GENERATION" Gold Sponsors- ^Sf -VEIL. ^ AT Singapore Information Technology Federation - Silver Sponsors tntermec Sniffer •• T E C H N O L O G I E S A N e t w o r k A s s o c i a t e s B u s i n e s s Supporting Sponsors. 3Com ABCHITECtS Of AN INTERNET WORID N O I C I A ewcT CONNECTING PEOPLE:'; 'embedded wireless devices inc broadaand wireless networking on a c/i/p™ reefedge onnOCO ~"~" designed by aderesy 1 . AT H EROS"
  • 13. PREFACE Wireless local area network technologies have changed dramatically in the past 2 years. In September 1999, the IEEE 802.11 Working Group for Wireless LANs finalized a 5 GHz standard (approved as IEEE 802.11a) that will support wireless data rates ranging from 6 to 54 Mbit/s. In an extension to the 2.4 GHz IEEE 802.11 standard (approved as IEEE 802.11b on September 1999), information can be transferred at data rates of up to 11 Mbit/s. These new developments have significant implications in that the standards are now more than capable of supporting streaming audio and video traffic needed for mobile multimedia applications. However, since these wireless LAN standards (802.11a and 802.11b) operate on different frequency bands (2.4 and 5 GHz) with differing rates, it is unclear which standard will eventually prevail. With new wireless personal devices involving Bluetooth starting to gain traction commercially, the wireless world continues to create difficult options for both end users and service providers. The 2001 International Conference on Wireless LANs and Home Networks showcases some of the world's most dynamic presenters, including Dr. Leonard Keinrock (Inventor of Internet Technology) as well as leading experts from 20 countries who presented the latest technology breakthroughs. This book is a collection of technical papers that were presented at the conference. It comprises 32 high-quality papers that were carefully selected from more than 100 submissions, many of which were worthy of publication. Among these accepted papers, authors of 5 best papers were invited to contribute articles for the IEEE Wireless Communications Magazine (formerly IEEE Personal Communications Magazine), a reknown and highly respected technical journal. In addition, a collection of white papers and tutorials from different companies is published in a separate volume. I am grateful to the program committee, the sponsors and the presenters for their time and tireless efforts in making this conference a reality and a success. Sincere thanks also go to the World Scientific staff namely Lim Sook Cheng, Yolande Koh and Chelsea Chin for their diligence in completing this project in a timely manner. I hope you will enjoy reading many of the ground-breaking innovations in this volume and look forward to your support in the next conference. Benny Bing Singapore, 2001 www.icwlhn.org vii
  • 15. TECHNICAL PROGRAM COMMITTEE Lek Ariyavisitakul, Home Wireless Networks, USA. Ben Arzine, British Telecom, UK. Ender Ayanoglu, Cisco Systems, USA. Yeheskel Bar-Ness, New Jersey Institute of Technology, USA. John Barr, Motorola, USA. Steve Bell, Agilent Interoperability Certification Labs, USA. Justin Chuang, AT&T Research, USA. David Cohen, 3Com, USA. Greg Ennis, Symbol Technologies, USA. David Everitt, Swinburne University of Technology, Australia. Laurent Frelechoux, IBM Research, Switzerland. Alex German, Panasonic Research, USA. Nada Golmie, National Institute of Standards and Technology, USA Lon Gowen, Mitre Corporation, USA. Bob Heile, Consultant, USA. Chin-Lin I, AT&T Research, USA. Konosuke Kawashima, NTT Advanced Technology, Japan. Parviz Kermani, IBM Research, USA. Leonard Kleinrock, University of California at Los Angeles, USA. Victor Li, University of Hong Kong, China. Pascal Lorenz, University of Haute Alsace, France. Teresa Meng, Stanford University, USA. Jouni Mikkonen, Nokia, Finland. Hiroyuki Morikawa, University of Tokyo, Japan. Guy Pujolle, University of Paris, France. Mike Sheppard, Ericsson, USA. Matthew Shoemake, Texas Instruments, USA. Roj Snellman, Intersil, USA. Peter Steenkiste, Carnegie Mellon University, USA. Richard van Nee, Lucent Technologies, The Netherlands. Sergio Verdu, Princeton University, USA. Naoaki Yamanaka, NTT Network Service Systems, Japan. Rodger Ziemer, National Science Foundation, USA. IX
  • 16. LIST OF REVIEWERS In addition to the program committee, the efforts of the following reviewers are gratefully acknowledged. A. Ahmad, DePaul University, USA. S. Buchegger, IBM Research, Switzerland. Y. Cao, University of Hong Kong, China. K. Chan, University of Hong Kong, China. W. Hirt, IBM Research, Switzerland. Z. Lei, University of Hong Kong, China. M. Katayama, NTT, Japan. K. Kawashima, NTT, Japan. M. Khan, Panasonic, USA. Z. Lu, University of Hong Kong, China. S. Okamoto, NTT, Japan. M. Osborne, IBM Research, Switzerland. D. Shimazaki, NTT, USA. K. Shiomoto, NTT, USA. Z. Zhang, University of Hong Kong, China. T. Znati, University of Pittsburgh, USA.
  • 17. CONTENTS Preface vii Part 1 Mobile Computing 802.11: No Strings Attached 3 J. Fawcett (University of Cambridge, UK) and W. Sowerbutts (AT&T Laboratories Cambridge Ltd, UK) Classroom in the Era of Ubiquitous Computing Smart Classroom 14 C. Jiang, Y. Shi, G. Xu and W. Xie (Tsinghua University, China) Hybrid Jini for Limited Devices 27 V. Lenders, P. Huang and M. Muheim (ETH Zurich, Switzerland) Part 2 Quality of Service and Wireless Internet A DiffServ-Based Classification Scheme for Internet Traffic Over Wireless Links 37 D. Skyrianoglou, N. Passas and S. Kampouridou (University of Athens, Greece) A Management Entity for Improving Service Quality in Mobile Ad-Hoc Networks 47 M Bechler, B. Hurler, V. Kahmann and L. Wolf (University of Karlsruhe, Germany) Integrating IPv4 and IPv6 in Wireless Networks 57 E. Jamhour (Pontificia Universidade Catolica do Parana, Brazil) XI
  • 18. XII Part 3 Error Control and Mobile Applications A Low Cost Error Control Scheme for Hard Real-time Messages on Wireless LANs 69 J. Lee, Y. Lee and S. Kim (Ministry of Science and Technology, Korea) Bundles Replacement in Gateways 79 B. Chen, K. Elhassioni (Rutgers University, USA) and I. Kamel (Panasonic Information and Technologies Laboratory, USA) Part 4 Bluetooth and 802.11 Flash Notes Over Bluetooth Wireless Technology 91 P. Jappinen and J. Porras (Lappeenranta University of Technology, Finland) Performance Enhancements to the IEEE 802.1 lb Standard 100 M. Shoemake (Texas Instruments, USA) Part 5 Network Security A User Authentication System for Secure Wireless Communication 113 N. Yamai (Okayama University, Japan) H. Ishibashi, K. Abe, T. Matsuura (Osaka City University, Japan) H. Morishita and T. Mori (Stella Craft, Inc., Japan) Design, Implementation and Evaluation of Bluetooth Security 121 J.-Z. Sun, D. Howie, A. Koivisto and J. Sauvola (University of Oulu, Finland) Your 802.11 Wireless Network has No Clothes 131 W. Arbaugh, N. Shankar and J. Wan (University of Maryland, USA)
  • 19. Part 6 Power Control and Performance Evaluation XIII Vertical Optimization of Data Transmission for Energy Aware Mobile Devices 145 K. Dombrowski, M. Methfessel, P. Langendorfer, H. Frankenfeldt, I. Babanskaja, I. Matthaei and R. Kraemer (IHP, Germany) RADIOSCAPE: System Design Tool for Indoor Wireless Communications via the Internet 154 Y. Watanabe, H. Furukawa, K. Okanoue and S. Yamazaki (NEC Networking Research Labs, Japan) Capture Effect in IEEE 802.11 Wireless LANs 164 Z Hadzi-Velkov andB. Spasenovski (Sts. Cyril and Methodius University, Macedonia) Part 7 Medium Access Control Optimizing the Polling Sequence in Embedded Round Robin WLANs 177 L. Andrew andR. Ranasinghe (The University of Melbourne, Australia) A Novel MAC Protocol for Power Efficient Short-Range Wireless Networking 187 T. Y. Chui and W. G. Scanlon - University of Ulster, Northern Ireland ROC: A Wireless MAC Protocol for Solving the Moving Terminal Problem 197 C.-H. Yeh (Queens University, Canada) Part 8 Protocol Design and Mobility Support Variable-Radius Routing Protocols for High Throughput, Low Power, and Small Latency in Ad-hoc Wireless Networks 215 C.-H. Yeh (Queens University, Canada)
  • 20. XIV An Overview and Comparative Evaluation of Wireless Protocols 228 A. Mercier (Ecole Centrale d'Electronique, France) P. Minet (INRIA, France) L. George and Gilles Mercier (University of Paris, France) Supporting Mobility in Distributed Proxy Server Architecture 241 H. Lee, K. Chung (Kwangwoon University, Korea) and K. Kim (LG Electronics, Korea) Part 9 Interoperability and Co-existence LAPP Enhancement Protocol 253 X. Jin and J. Li (Xidian University, China) The Hybrid of Listen-Before-Talk and Adaptive Frequency Hopping for Coexistence of Bluetooth and IEEE 802.11 WLAN 263 Y. Kim, B. Zhen and K. Jang (Samsung Advanced Institute of Technology, Korea) A Hybrid Architecture of UMTS and Bluetooth for Indoor Wireless/Mobile Communications 273 T. Kwon, R. Kapoor, Y. Lee, M. Gerla (University of California , USA) and A. Zanella (Universita degli Studi de Padova, Italy) Part 10 Multicarrier Systems Adaptive Link Adaptation for Multicarrier Systems 285 F. Tang, S. Thoen, M. Engels andL. Deneire (Interuniversity Microelectronics Center, Belgium) On the Performance of the Ubiquitous Antennas for the Reception of COFDM Signals 295 S. Okamura, S. Komaki (Osaka University, Japan) and M. Okada (Nara Institute of Science and Technology, Japan)
  • 21. XV Improved Automatic Frequency Control for OFDM 305 H. Hosseini and B. Rohani (Genista Research, Singapore) Part 11 Antennas and Interference Control A MIMO Architecture for Wireless Indoor Applications 317 L. Giangaspero, G. Paltenghi (CEFRIEL, Italy) and Luigi Agarossi (Philips Research Monza, Italy) Inter-cell Interference Effect on OFDM-based Wireless LAN 327 P. Mahonen and A. Jamin (University of Oulu, Finland) Part 12 Mobile Ad-Hoc Networks Analyzing Capacity Improvements in Wireless Networks by Relaying 339 H. Karl and S. Mengesha (Technical University of Berlin, Germany) Wireless LAN with Wireless Multihop Backbone Network (WMLAN) 349 K. Mase, N. Karasawa, M. Kusumi, K. Nakano and M. Sengoku (Niigata University, Japan) Author Index 359
  • 24. 802.11: N O S T R I N G S A T T A C H E D J O H N K FAWCETT Laboratory for Communications Engineering, University of Cambridge, Trumpington Street, Cambridge CB2 1PZ, UK E-mail: jkf@uk.research.att.com WILLIAM R S O W E R B U T T S AT&T Laboratories Cambridge Ltd, 24a Trumpington Street, Cambridge CB1 1QA, UK E-mail: will@sowerbutts.com We describe the deployment strategy and application-level use of indoor and out- door, point-to-point and point-to-multipoint 802.11b networks. For residential environments, applications combining radio networks with multimedia, location systems and home security systems are presented. We extend the home network paradigm with vehicular-based mobile computation where interference, shielding, range and power consumption issues are prevalent. The vehicle is considered both as a server—the user transports the 'master copy' of data—and as a client through disconnected operation and intelligent caching. Further, we discuss experiences of realising high bandwidth, low latency, fixed-broadband Internet access using out- door 802.11b installations. Frequently neglected aspects of theoretic and practical network and data security are explored. 1 Introduction Houses are for living, relaxing and spending time with the family. Increasingly these activities involve one or more personal computers. Parents often find themselves pruning the cabling sprawl laid down by their teenage offspring for head-to-head gaming. Interconnect technologies such as the Universal Serial Bus (USB)a , IrDA6 , FireWire (IEEE 1394)6 , X10c , and Networked Surfaces7 seek to reduce cabling. Fully wireless mobility, eliminating short range line-of- sight requirements, is introduced by radio-based approaches including Blue- tooth'*, PEN1 (formerly Piconet), HomeRFe and the 802.114 family. This paper focuses on 802.11b and first discusses the outdoor installations used by the authors, comparing cost to the consumer, investment in infrastruc- ture, performance and security to alternative always-on consumer broadband a USB Implementers Forum: http://www.usb.org/ infrared communication, http://www.irda.org/ c home automation, http://www.xlO.org/ d short range radio, http://www.bluetooth.org/ e http://www.homerf.org/ 3
  • 25. 4 provisions. Identical hardware finds further use within the home in Section 3 transporting bandwidth intensive video streams and delay-sensitive control signals. Applications and services enabled by mobile computing and wireless communications in a vehicle context are explored in Section 4. 2 Fixed Broadband Wireless Employers seek to maximise staff productivity in order to lower operating overheads and remain competitive. Providing access from home to their cor- porate e-mail and filespace encourages employees to continue their work at home and allows them to remain in touch with colleagues. Broadband to the home can provide the rich information services expected of an office environ- ment, allowing telecommuting and corporate expansion without the risk or financial burden of increasing office space. Access solutions making new use of existing wired networks—ISDN, leased lines, digital subscriber line (DSL) and cable modems—all provide sufficient bandwidth but incur repeated monthly costs from the service providers which own the infrastructure and provide connectivity. Offices already enjoy high- bandwidth Internet connections and, from their rooftops, can offer line-of- sight radio connections directly to properties in the surrounding suburbs. Or- ganisations providing employees with wireless connectivity to their networks can eliminate ISP subscription and most running costs in exchange for a small slice of the network administrator's time. Furthermore, broadband wireless 802.11b surpasses the bandwidth and latency offered by cable modems and DSL solutions (Table 1). The imminent release of 802.11a will further widen the price/performance gap. Most off-the-shelf 802.11b products do not offer external antenna connec- tion jacks, which has severely limited the uptake of outdoor equipment and long-range deployments. Lucent Technologies' ORiNOCO product family' are one exception; SMC offer a similar product based on the Prism II chipset. The ORiNOCO cards cost approximately US$100 and outdoor antennae retail for US$120. The initial cost to the consumer is therefore comparable to that of cable modem and DSL services. The low latency of the wireless solution listed in Table 1 results from connections being direct rather than routed through a chain of ISP networks. The resulting responsive interactive behaviour of applications facilitates pro- ductive working, and was unanimously preferred by subjects in the trials. In the United Kingdom the European Telecommunications Standards In- 'http:// www.wavelan.com/
  • 26. 5 Table 1. Comparison of popular broadband solutions in Cambridge (UK) Technology ISDN Cable modem DSL 802.11b Typical Bandwidth/kbps 64 / 128 512 512 4800 Latency/ms 90 40 50 2 Table 2. Outdoor 802.11b deployments in Cambridge Distance/km 0.25 0.5 1 2 4 7 10 Mode/Mbps 11/5.5 5.5/11 Latency/ms 2.0 2.0 2.0 2.0 2.0 2.1 2.2 stitute (ETSI)3 and the Radio Authority (RA)h mandate that the effective isotropic radiated power (EIRP) output of systems in the 2.4 GHz band, mea- sured at the antenna, be capped at 100 mW. This permits aerials of up to 12 dBi gain to be used with red* ORINOCO cards. The authors performed trials using Agere Systems 16 element vertically polarised directional Yagi antennae with 14 dBi gain, mast mounted at con- nection end points. Losses slightly exceeding 3 dBi were introduced by cabling, surge arrestors, band-pass niters and inline adaptors. Azimuthal gain plots8 indicated the main beam width to be 7 degrees, with a half-power beam width of 30 degrees. Antennae were mounted on the lab roof and oriented to cover popular sub- urbs of Cambridge and near-by commuter villages. Similar antennae secured at domestic end-points were oriented back towards the lab. The established links are summarised in Table 2. Lucent quote a maximum achievable range of 25 km in ideal conditions with symmetric Yagi antennae if, as is often the case with domestic connections, a single megabit of bandwidth is tolerable. A line-of-sight to accommodate the Presnel bulge proved essential for links 9 http://www.etsi.org/ h http://www.radio.gov.uk/ •"Red" ORiNOCO cards are designed for use with high-gain antennae and contain lower powered radio transmitters than their "black" counterparts, which are typically used by mobile nodes.
  • 27. 6 exceeding 500 m; a partially obscured trajectory sufficed for shorter paths. Where geographic and topological constraints prevent direct connection, relay stations can be used to forward packets. Azimuthally orienting the antennae proved to be less troublesome than was expected; a good connection for a 10 km link was established simply by aiming at roughly the correct point on the horizon. Yagi antennae are polarised and sensitive to rotation about their length- wise axis. The performance of the connections is substantially invariant to everyday weather conditions; link goodput does not suffer from rain fade, al- though the greater microwave opacity presented by fog causes a significant decrease in signal-to-noise ratio (SNR), ultimately resulting in drop-out. Thus far, each link is point-to-point. Trials of point-to-multipoint and mesh networks are underway, offering the potential for higher aggregate band- width and adaptive routing for fault and congestion resilience. In a dense mesh the links are generally shorter than those used above and omni-directional an- tennae are more appropriate, as illustrated in Figure 1. Mesh networks over 802.11b are not without compromise: the necessary intercommunication requires agreement over channel and encryption key. Spa- tial reuse of channels in non-interfering bands can increase total network ca- pacity at the expense of potentially introducing nodes of articulation whose failure may partition the network. While parameter co-ordination is feasi- ble within an organisation, the need for disjoint institutions to co-operate in synchrony may prove troublesome. The increased internal bandwidth is easily sufficient for voice-over-IP or video conferencing traffic. However, encrypted tunnels between the houses of participating individuals would be required if the internal bandwidth of the mesh is to be securely exploited. Link-layer wired equivalent privacy (WEP) offers a false sense of security as the integrity of the secret key is prone to compromise10 . Point-to-point IPsec or Virtual Private Network (VPN) tun- nels would provide end-to-end encryption but the human overhead of estab- lishing per-tunnel shared keys scales poorly. Opportunistic Encryption^ solves this problem by dynamically generating shared secrets for IPsec connections as they are constructed. When one node needs a secure connection to another— for example when a voice-over-IP call is made—each fetches the other's public key from a trusted repository. Responses from the repository server are signed under a key whose public component is well-known. The signature is verified to prevent man in the middle attacks, and a shared secret is constructed by both nodes using the local private key and the peer's public key. This ma- 3 implemented, for example, in PreeSWAN. http://www.freeswan.org/
  • 28. 7 a a Isn Figure 1. Mesh networking with 802.11b terial is knowable only by the two communicating endpoints and suitable for deriving IPsec key material. The contributions to wide-area networking are the highly cost-effective provision of significant, reliable, always-on connectivity to the home. Wireless Internet Service Providers (ISP) are undercutting their wire-based counter- parts in certain US cities although the current scale of operations leaves many neighbourhoods without coverage. The UK consumer has yet to be offered wireless broadband. Value for money and unobtrusive installation are the primary requirements of most homeowners; each can be satisfied by 802.11b hardware. Operating costs are minimal and employers can affordably provide subscription-free or subsidised bandwidth to employees. 3 Home Area Networking PCs are becoming increasingly common in the domestic environment; they are used not only in their traditional office roles, but as entertainment centres and information gateways. The convenience and value of networking PCs in the home makes for familiar reading. However wired networking in the home is not as convenient as in an office as homes typically do not have either suitable cabling or cable trunking installed. This problem is particularly marked in the UK, where new-build houses
  • 29. 8 are rare and cables must be retro-fitted to existing properties. Hollow walls are uncommon, and the expense of buying and cabling network access points is overwhelmed by the cost of "making good" aesthetic aspects. Wireless tech- nologies have a clear advantage in not requiring any structural modifications, especially in listed buildings where approval must be sought. The radio zone around an 802.11b node is sufficiently large to encompass an entire house, which allows the use of IBSS mode ad-hoc networks. Wireless networks make possible many applications which would otherwise be prohibitively expensive. The authors conducted comparison trials using a group of technical people with prior home Ethernet deployments. Hardware wireless access points and NAT bridges were eschewed in favour of Linux boxes, which offered greater configurability. These allowed the use of per-flow rate throttling, packet filter- ing and more secure firewalling, as well as routing onto the wide-area networks discussed in Section 2. The radio channel used for the WAN was chosen to avoid interference with the 802.11b network within the house. The trials revealed that popular applications of wired networks remained so with their wireless counterparts; file-sharing, gaming and Internet access were used extensively by all participants. An unexpectedly popular applica- tion was streaming media—several participants streamed live video encoded from a frame grabber and TV tuner to watch TV on their wireless laptops, in one case using a data projector and HiFi as an immersive home cinema. One participant reported installing a new digital TV aerial in his loft using the wireless video stream to guide alignment. Spooling the encoded video to disk allowed the system to be used as a video recorder for purposes of time shifting programming. Streaming music from storage to playback devices was also popular; one participant digitised his entire music collection of several hundred CDs, loss- lessly compressed, onto a 360 Gb RAID-5 array. This application has wide appeal as it makes one's music collection available anywhere in the house without the need to hunt for, or change, media. High-quality webcams connected to nearby embedded computers allow wireless video conferencing, and also double up as security cameras. Using the wireless wide-area network the information from these cameras could be easily transported off site. The privacy concerns of distributing live video from inside the house are addressed by using an asymmetric cipher to encrypt each frame on the capturing PC. The private component of the encrypting key is held securely and only released to the relevant authorities (eg, the police or insurance company) when the owner chooses to do so. Thus, even if the PC which encrypts the video is compromised, the spying intruder cannot decrypt previously streamed video data.
  • 30. 9 The wireless network also proved useful for data acquisition around the house. One house has curtains which open or close under computer control, and a wireless weather monitoring system from Oregon Scientific. Data acqui- sition cards in the embedded PCs throughout the house sample signals from microswitches concealed in each door and window, connected by short wires. Information from these sensors is fed over the wireless network for storage in a database and used for security applications—for example, the occupant is alerted upon leaving the house if any windows remain open. A second house uses microswitches and wall switches connected to small microcontroller boards which communicate over a shared RS485 serial bus. The wall switches become event generators controlling digitally dimmable lighting connected to the wireless network, replacing the traditional hard- wired light switches in each room. However, the serial bus must still be wired to nearest the embedded 802.11 wireless node. A future study will replace this serial bus with a Bluetooth network. Bluetooth was chosen because its low power consumption allows battery powered switches which require infrequent cell replacement. Light switches could be glued to the wall since there is no- longer a requirement for any wires. These short-range Bluetooth networks would be bridged by the nearest embedded PC onto the 802.11 backbone network. The embedded PCs also poll local Active Badge9 networks; an Ac- tive Badge is a battery-powered, wearable computing device capable of bi- directional infrared (IR) communication with fixed 'stations'. Badges beacon periodically to advertise their presence; their location is determined by which station can hear them. Occupants who choose to wear an Active Badge make their location available to the house computers, and can issue events by click buttons on the Badge. The house computers control Sentient Computing5 applications based on the location and actions of occupants. For example, curtains, lighting, music and so on can all be automatically controlled. The Badges provide a two-button control set which users carry contin- uously. However, to support less cumbersome interaction with complex de- vices an 802.1 lb-enabled palmtop is used as a ubiquitous remote control and portable media player. 4 Car Area Networking We have extended home and corporate networks into the private vehicles of several volunteers. Car-PCs provide navigation and guidance aids for the driver2 and entertainment, information and workstation facilities to any pas- sengers. The hardware hosts analog and digital I/O logic, creating a mobile
  • 31. 10 Figure 2. Car-PC and environmental sensors data acquisition and information processing platform. Radio networking pro- vides a convenient, high bandwidth transfer mechanism for use between the vehicle computer and a fixed base station, or amongst a collection of vehicles. Car-PCs axe operable both when driving and with the ignition off. 4J Environmental Monitoring Our Car-PCs (see Figure 2) continually log meteorological data and ambi- ent atmospheric pollutant concentrations: every second the vehicle GPS is polled and measurements are taken from environmental sensors which mea- sure ambient light, temperature, barometric pressure and humidity, as well as atmospheric levels of nitrogen dioxide, sulphur dioxide, carbon monoxide and ozone. Extensible Markup Language (XML) events are generated and serialised to a logfile. Some data have immediate application, for example if, while driving, a high Nitrogen Dioxide level is encountered the climate control unit can be directed to recirculate air and thus block out carcinogenic traffic fumes. The previous setting can be restored when pollutant concentrations return to safe levels. On arrival at home or work, a Car-PC uses the bandwidth afforded by the radio network to upload the logfiles accumulated since its previous synchro- nisation. The data are then useful to city planners striving to reduce urban pollution for students and tourists. Wired networks such as Ethernet and USB
  • 32. 11 would require trailing cables out to the parking lot; using removeable media such as compact flash or floppy disks would necessitate additional equipment in the car and still require human intervention to transfer the data. The range of Bluetooth is insufficient to communicate with our lab on the fourth floor and infra-red transducers are saturated by sunlight during daylight hours pre- cluding either technology from application in this context. The convenience and automation of the 802.11b package is allowing city councils to consider installing the equipment in busses and taxis to collect data in a larger survey. 4-2 Entertainment The convenience of the wireless network enables spontaneous downloading of music to the Car-PC system. The hassle-free user experience does not present a psychological barrier or otherwise deter use of the system—from their home or office PC the user has only to drag and drop audio files onto a icon depicting the car. An unduly tedious set-up procedure would be excessively cumbersome and cause users to elect to live with their existing configuration and avoid the agitation associated with makes changes. Vehicular use of 802.11b is not limited to file copying. Car-PCs operate an Active Badge station9 which is used to identify passengers, distinguish theft and use by the owner and control the entertainment and navigation software. As I approach my driveway and the radio network connection with the com- puters in my house is restored real-time events can be passed to configure the house for my arrival. For example, the car stereo can communicate with a PC in the house to create the effect of the audio stream 'following-me' into the house. In order to achieve this the radio layer must recognise its peer and complete any handshaking in a timely fashion. For example, DECT supports appropriate ranges but is not designed for situations where recovery from prolonged signal loss is expected and consequently compliant devices may not notice the presence of another node for up to 20 minutes after communica- tion becomes possible. Bluetooth and PEN devices remain alert to changing connectivity and could be used in place of 802.11b for this application. How- ever, PEN has insufficient bandwidth to stream reasonable quality audio to the house, as is necessary if the track being played is not present in the user's home music collection. 4-3 Document Transfer A car with a Car-PC can be used to transfer files, sneaker-net style, as the owner drives about. Using the car as a briefcase to transfer electronic doc- uments simplifies to a drag-and-drop copy operation. More often, users save
  • 33. 12 and edit documents directly over the network using NFS or Samba services hosted by the Car-PC. The former modus operandi leaves the 'master copy' at work—a copy is taken away—suiting group-working but necessitating dis- connected operation and update-merging techniques. The latter paradigm corresponds to single-owner documents and greatly simplifies the user's task of transporting files; consider, for example, a sales executive storing all his PDF brochures, client notes and his diary on a Car-PC. 4-4 Future Applications A future car could exploit available broadband Internet connectivity by con- necting to its manufacturer's website for code updates, safety advisories or simply to book a service or MOT. The computer might utilise location-based services, for example offering a search of near-by restaurants, service stations or digital map vendors to the occupants. Many such interactions can be triggered automatically, for exam- ple on approaching a city, a vehicle's computer might procure an enumeration of digital map distributors so the driver can easily purchase a detailed town plan before entering the city centre. 5 Conclusion Outdoor 802.11b deployments are cost-effective and satisfy the bandwidth and latency requirements of telecommuters residing up to 10 km from their employer's office. Encrypting tunneling protocols safeguard personal and cor- porate data and scale linearly to mesh networks through opportunistic encryp- tion. Within the home we enabled novel applications and improved existing ones through mobile and embedded computers, and reduced wiring clutter without compromising the decor or aesthetics. In a wireless house careful consideration must be given to the privacy of the occupants and the security of the network. For motor vehicles, navigation, sensing, data transport and en- tertainment applications based on Car-PCs and wireless communication were presented. The use of identical hardware at work, at home, between the two and in the car results in reduced costs. User interface familiarity additionally benefits employers by reducing the cognitive load of performing simple con- figuration, thus increasing productivity. Next-generation wireless standards are emerging, offering increased bandwidth and strengthened security.
  • 34. 13 Acknowledgements John Fawcett receives an EPSRC grant and a CASE award from AT&T Lab- oratories, Cambridge and is working on a PhD at the Laboratory for Commu- nications Engineering. Thanks are due to Martin Brown for suppling some of the equipment and to Ian Wassell and Alastair Beresford for their assistance with radio regulatory compliance issues. References 1. F. Bennett, D. Clark, J.B. Evans, A. Hopper, A. Jones, and D. Leask. Piconet - embedded mobile networking. In IEEE Personal Communica- tions, Vol. 4, No. 5, 8-15, 1997. 2. J.K. Fawcett and A.H. Jones. The road to driveable computing. Royal Institute of Navigators Journal, To appear. 3. J.K. Fawcett and W.R. Sowerbutts. Wireless network security. In press, 2001. 4. V. Hayes. IEEE standard for information technology - telecommunica- tions and information exchange between systems - local and metropolitan networks - specific requirements - part 11: Wireless Ian medium access control (mac) and physical layer (phy) specifications: Higher speed phys- ical layer (phy) extension in the 2.4 ghz band. Technical Report Desig- nation 802.11b-1999, IEEE, 1999. 5. A. Hopper. Sentient computing. In The Royal Society Clifford Patterson Lecture, 1999. 6. G.A. Marazas. IEEE standard for a high performance serial bus. Tech- nical Report Designation 1394-1995, IEEE, 1995. 7. J. Scott, F. Hoffmann, G. Mapp, M. Addlesee, and A. Hopper. Networked surfaces: A new concept in mobile networking. In 3rd IEEE Workshop on Mobile Computing Systems and Applications, 2000. 8. Lucent Technologies. User's guide for out- door router outdoor antennas rev. c. In ftp://ftp. orinocowireless. com/pub/'docs/Wave A CCESS/MANUAL/ OR/oaig.c.pdf, 2000. 9. R. Want, A. Hopper, V. Falcao, and J. Gibbons. The active badge lo- cation system. ACM transations on Information Systems, 10(1):99-102, January 1992. 10. S. Fluhrer, I. Mantin and A. Shamir. Weaknesses in the Key Scheduling Algorithm of RC4. Selected Areas in Cryptography, 2001.
  • 35. CLASSROOM IN THE ERA OF UBIQUITOUS COMPUTING SMART CLASSROOM CHANGHAO JIANG, YUANCHUN SHI, GUANGYOU XU AND WEIKAIXIE Institute of Human Computer Interaction and Media Integration Computer Science Department, Tsinghua University Beijing, 100084, P.R.China E-mail: jiangch @media.cs.tsinghua.edu.en, shiyc @tsinghua. edu. en, xgy-des@mail.tsinghua.edu.en, xwk@media.cs.tsinghua.edu.cn Abstract: This paper first presents four essential characteristics of futuristic classroom in the upcoming era of ubiquitous computing: natural user interface, automatic capture of class events and experience, context-awareness and proactive service, collaborative work support. Then it elaborates the details in the design and implementation of the ongoing Smart Classroom project. Finally, it concludes by some self-evaluation of the project's present accomplishment and description of its future research directions. Keywords: Ubiquitous Computing, Intelligent Environment, Multimodal Human- Computer Interaction, Smart Classroom 1 Introduction: From UBICOMP to Smart Classroom Desktop and laptop have been the center of human-computer interaction since the late of last century. As is a typical situation of human's dialogue with computer that a single user sits in front of a screen with keyboard and pointing device, interacting with a collection of applications [Winograd 1999]. In this model, people often feel that the cumbersome lifeless box is only approachable through complex jargon that has nothing to do with the tasks for which they actually use computers. Too much of their attention is distracted from the real job to the box. Deeper contemplation on valuable matured technologies tells us: the most profound technologies are those that disappear, which means they weave themselves into the fabric of everyday life until they are indistinguishable from it [Weiser 1991]. We use them everyday, everywhere even without notice of them. Based on this point of view, computer is far from becoming part of our life. Mark Weiser first initiated the notion of Ubiquitous Computing (UBICOMP) at Xerox PARC [Weiser 1993], which envisioned, in the upcoming future, ubiquitous interconnected computing devices could be accessed everywhere and used 14
  • 36. 15 effortlessly, unobtrusively even without people's notice of them, just as electricity or telephones of today. This inspiring view of prospect has been accepted and spread so fast and widely that in a short time of a few years, many ambitious projects have been proposed and carried on to welcome the advent of UBICOMP. There are a bunch of branch research fields under the banner of UBICOMP, such as Mobile Computing, Wearable Computing and also Intelligent Environment, etc. The focus of this paper, Smart Classroom, belongs to the field of Intelligent Environment. But what is Intelligent Environment? In our point of view, we define it as an augmented spacious environment populated with many sensors, actuators and computing devices. These components are interwoven and integrated into a distributed computing system which is able to perceive its context through sensors, to execute intelligent logic on computing devices and serve its occupants by actuators. (In some research projects, Intelligent Environment is also referred as Interactive Space, Smart Space etc.) In researches of Intelligent Environment, there are several relevant and challenging issues need to be solved, such as the interconnection of computing devices on many different scales, the handling of various mobility problems caused by user's movement, and network protocol, software infrastructure, application substrates, user interfaces issues etc. Although many projects have been conducted in the name of Intelligent Environment, they have different emphases. Some focus on the integration of different sensing modalities [Coen 1999, HAL 2000], some aim at the adaptability of Intelligent Environment to user's preference [Mozer 1999], some are interested in automatic capture of events and rich interactions that occurs in an Intelligent Environment [eClass 2000, Adowd 2000], and some target at facilitating the collaboration of multi-user multi-device within a technology-rich environment [Interactive Workspace 2000, Fox 2000]. We can easily enumerate several other ongoing Intelligent Environment projects with different specializations, such as Georgia Tech's Aware Home [Aware Home 1999, Kidd 1999], IBM Research's DreamSpace [DreamSpace], Microsoft Research's EasyLiving [EasyLiving] etc. Our institute developed special interest in exploring the impact of ubiquitous computing to education. This leads to the project of Smart Classroom. The Smart Classroom is a physical experimental environment, which integrates multimodal human computer interface with CSCW modules collaborating through inter-agent communication language to provide a smart space for lecturer's natural use of computer to give class to distance learning students. In the rest of this paper, we're going to first present our views of futuristic classroom in UBICOMP. And then toward the ideal model of classroom, which sounds a little Utopian, we'll explain the idea and focus of our exploration. Later some details in the design and implementation of our present work will be illustrated. We'll conclude by a short description of our future goals.
  • 37. 16 2 What Should Classroom in The Era of UBICOMP Be Like? Michael H. Coen from MIT Artificial Intelligence Lab said, "Predicting the future is notoriously difficult". [Coen 1999] Yes, we're not able to prescribe what future would be, but we're able to create toward what we think it would be. In our point of view, the following features are essential to a smart classroom in the era of UBICOMP, and will serve as the guidelines in our ongoing Smart Classroom project. We have generalized four characteristics of futuristic classroom, which are: natural user interface, automatic capture of class events and experience, context-awareness and proactive service, collaborative work support. 2.1 Natural user interface As Mark Weiser has observed, "Applications are of course the whole point of ubiquitous computing". In accordance with this essence of UBICOMP, it is necessary for a smart classroom to free its occupant's attention to computer. To rescue people's energy from irrelevant interaction widi computer to the intentioned goal, allowing user's interaction with computer as naturally as possible is vital. In such a new paradigm of human-computer interaction, people input information into computer in their most familiar and accustomed ways like voice, gesture, eye-gaze, expressions etc. Auxiliary input devices like keyboard, mouse, are not necessary. In the reverse side, computer tends to serve people like an intelligent assistant. It utilizes technologies like projector display, voice synthesis, avatar, etc. This is what we call natural user interface. To get a clearer image, suppose a lecturer in the Smart Classroom conducting the class by voice. "Let's go to chapter two". Computer recognizes phonetic command and projects the wanted courseware of chapter two on display. Lecturer also uses hand gesture as a virtual mouse to annotate on the projected electronic board. Through combination of eye gaze (or finger pointing) and voice command, lecturer can zoomed in the image of an area in the projector to give emphasized explanation on a specific topic. 2.2 Automatic capture of class events and experience This is what eClass project of Gatech called "automated capture, integration and access" problem. We use computer in classroom not only to improve die quality of teaching activity, but also to augment its capability, which was impracticable traditionally. The automatic capture of class event and experience belongs to such capabilities. It's not just record of video and audio in the environment, which is common in traditional distance learning-television broadcasting program. It
  • 38. 17 includes the record of group collaboration, multimedia events, multiple channels of human computer interaction, etc, all the events and experience that happened in the environment. The captured events and experience should be assembled into a kind of multimedia compound document. People can recreate the class experience by play the recorded multimedia compound document, and also can search a specific event or query knowledge within the compound document. This technology provides lecture content to students who are unable to attend the class in person, as well as to those who wish to review the materials later. For example, suppose a lecturer giving a class on Artificial Intelligence in a Smart Classroom. All the audio, video information, lecturer's annotation events, student's question events, Smart Classroom's controlling of lights, slides, etc, are recorded into a multimedia compound document. When a student wants to review the knowledge of Alpha-Beta Pruning algorithm, he can just query about it through his laptop computer, and rewind to the previous talk on it for a quick review and then comes back. After the class, students can also replay the document to recreate the class experience. 2.3 Context-awareness andproactive service What is context-awareness? According to Dey & Abowd (from Gatech 1999), "context is any information that can be used to characterize the situation of an entity, where an entity can be a person, place, physical or computational object", "context-awareness is to perceive the context by system so as to provide task-relevant information and/or services to a user, wherever they may be". Which means the Intelligent Environment can understand user's intention not only based on audio-visual inputs, but also based on its situational information. Proactive service means to serve the user without his request. Proactive service is based on the Intelligent Environment's capability of Context-awareness. This model of service is disparate from traditional human-computer interaction paradigm, in which computer respond to human's explicit command. In the Intelligent Environment, the computer remembers the past, recognize the present, and predicate the future. It reasons human's intention through analysis of all the information from accumulated knowledge base. Then it tries to serve its occupants proactively with the reasoned intention of its user. For example, the lecturer is explaining a formula displayed on the electronic board. When the lecturer points at it and starts to talk about it, the computer understands that the lecturer is going to attract students' attention to the specific area of display. Then it zooms in the area containing that formula on the display without the need of lecturer's commanding "Zoom in this region". Another example, when the lecturer wants to have a student named Wang to give his opinion on a topic, he points at the student and says, "Wang, would you please say
  • 39. 18 something about what you think of this problem?" The computer then automatically focuses the video camera and microphone array on Wang and filters out the noise emitted from other spaces. 2.4 Collaborative work support Class is essentially a collaborative procedure evolving multiple participants. In the environment of ubiquitous computing, the introduction of many interconnected computing devices and wide area network support enables us to extend beyond the space boundaries imposed by traditional classrooms. With this technological advance, collaborations of multi-user and multi-device can be possible. And the support for collaboration is becoming a requisite of a smart classroom. The collaborative work support of a Smart Classroom can be categorized into two classes. One is the collaboration of multiple attendants within the Smart Classroom holding various computing devices like, pen-based devices, hand-held devices and wearable computer etc. The other is the collaboration of remote participants and local attendants. The demand for collaboration support is so obvious that many commonly observed tasks in a classroom, such as group discussion, evolve the collaboration among multiple persons. There are some projects specialized in enabling and exploiting smart classroom's collaboration support, such as collaborative note-taking in both Gatech's eClass [eClass 2000] and Stanford's Interactive Workspaces [Interactive Workspaces 2000 ]. 3 The Focus of Smart Classroom Smart Classroom is a big project, every above-mentioned aspect of it is challenging and a long-term effort. Our institute has been committing itself to the research on multimodal human computer interfaces, CSCW in wide area network, and also multimedia integration. Based on our existing research results we have been investigating Smart Classroom's following features: natural user interface, automatic capture of classroom events and experience, and collaborative work support. So in initial phase of our project, we focus on applying our previous research achievements to realize an experimental environment. We have set up the physical experimental environment to demonstrate our idea and focus. In this Smart Classroom, we mainly aim at the following features: conducting lessons by means of gesture and voice command, capturing class events and operation such as manipulation on courseware, video-audio streams of class, etc, admission control of students using all kinds of mobile computing devices. In order to give clearer image
  • 40. 19 of our research, an elaboration of the physical experimental environment layout and its user-experience scenario are given as following. 3.1 The layout ofSmart Classroom Our Smart Classroom is physically built in a separate room of our lab. Several video cameras, microphones are installed in it to sense human's gesture, motion and utterance. According to UBICOMP's characteristic of invisibility, we deliberately removed all the computers out of sight. Two wall-sized projector displays are mounted on two vertically crossed walls. According to their purposes, they are called "Media Board" and "Student Board" separately. The Media Board is used for lecturer's use as a blackboard, on which prepared electronic courseware and lecturers' annotation are displayed. The Student Board is used for displaying the status and information of remote students, who are part of the class via Internet. The classroom is divided into two areas, complying with the real world classroom's model. One is the teaching area, where is close to the two boards and usually dominated by lecturer. The other is the audience area, where is the place for local students. Why are both remote students and local students supported in this room? The answer is simple, that we're complying with the philosophy of Natural and Augmented. Natural means we'll obey real-world model of classroom as much as possible to provide lecturer and students the feeling of reality and familiarity, which leads to the existence of local students. Augmented means we'll try to extend beyond the limitation imposed by the incapability of traditional technology, which is the reason for remote student. AStudent Boards ^f DDDDDD DDDDDD DDDDDD DDDDDD DDDDDD DDDDDD Audience Area »"Teaching Area"! Figure 1. Layout of Smart Classroom In Smart Classroom, users' rights to use the room are mapped to their identification. There is an audio-visual identification module for identifying the users in this room and authorizing control right to lecturer. With the help of visual
  • 41. 20 motion-tracking module, Smart Classroom can be aware of its occupants' places in the room. Once a user identified as lecturer entering the teaching area, he is authorized to control the Smart Classroom by voice and gesture command. Lecturer can use hand-gesture as a virtual mouse on the Media Board to annotate, or add/move objects on the electronic board. He can also command linking in courseware, perform operations like scrolling pages, removing objects, granting speech right, etc by voice. All the lecturer's operation on the courseware and audio-video information captured in the Smart Classroom are automatically recorded and integrated to a multimedia compound document. The recorded information is simultaneously broadcasted to remote Students via Internet synchronously. Through software's application layer trans-coding and adaptive reliable multicast transport, remote students are promised to join the class with devices varied in computational power and display resolution through heterogeneous network varied in quality of service. Figure 2. Typical scenario in Smart Classroom 3.2 A typical user experience scenario The following is a typical user-experience scenario happened within the Smart Classroom. Multiple persons enter the room through the door. At the door, there is an audio-visual identification module identifying the entering person's identity through facial and voice identification. If the person is identified as lecturer, he is granted the control right of the Smart Classroom. The visual motion-track module tracks the lecturer's motion in the room. Once he steps into the teaching area, he will be able to use gesture and voice command to exploit the Smart Classroom to give lessons. Persons in the Smart Classroom other than lecturer are deemed as local students. When the lecturer is in the teaching area, he can start the class byjust
  • 42. 21 saying, "Now let's start our class." The Smart Classroom then launches necessary modules such as Virtual Mouse agent, Same View agent (which will be talked about later). Lecturer loads prepared electronic courseware by utterance like, "Go to Chapter 1 of Multimedia course". The HTML-based courseware is then projected on the wall display. Lecturer can use hand-motion to stimulate the Virtual Mouse agent to annotate on the electronic board. Several type of hand gestures are assigned corresponding semantic meanings, which cause several operations like highlighting, annotating, adding pictures, remove object, executing links, scrolling pages etc, on the electronic board. Lecturer can also grant speech right to remote students by finger pointing or voice command, like "Li, please give us your opinion". On the Student Board, remote students' photos and some information as name, role, speech right etc are displayed. When a remote student requests for floor, his icon on the Student board twinkles. Once the lecturer grants the floor to a specific remote student, his video and audio streams are synchronously played both in the Smart Classroom and on other remote students' computers. 4 Details of Smart Classroom's Design and Implementation The Smart Classroom is essentially a distributed parallel computing environment, in which many distributed software/hardware modules collaborate to accomplish specific jobs. Software infrastructure is the enabling technology to provide facilities for software components' collaboration. There are some alternative solutions to software infrastructure, such as Distributed Component-Oriented Model, like EJB, CORBA, DCOM, etc, and Multi-Agent Systems (MAS). In the context of Intelligent Environment, Multi-Agent System is more competent than Distributed Component-Oriented Model due to the following reasons: higher encapsulation level, faster evolution from design to implementation, easier development and debugging, and most importantly, more accordant to the need of dynamic reconfiguration and loose-coupling. 4.1 4.1 Software platform-OAA In current stage, instead of developing our own Multi-Agent System, we choose to use SRI's famous open source MAS product, Open Agent Architecture (OAA) [OAA]. There're already many successful multimodal human-computer interaction projects built on OAA. Its delegating computing model also fits well in our need of software infrastructure. In OAA's delegating computing model, the network of distributed software modules is conceptualized as a dynamic community of agents, where multiple agents contribute services to the community. When external services or information are required by a given agent, instead of calling a
  • 43. 22 known subroutine or asking a specific agent to perform a task, the agent submits a high-level expression describing the needs and attributes of the request to a specialized Facilitator agent. The Facilitator agent will make decisions about which agents are available and capable of handling sub-parts of the request, and will manage all agent interactions required to handle the complex query. Such a distributed agent architecture allows the construction of systems that are more flexible and adaptable than distributed object frameworks. Individual agents can be dynamically added to the community, extending the functionality that the agent community can provide as a whole. The agent system is also able to adapt to available resources in a way that hard-coded distributed objects systems can't. 4.2 Five dedicated agents in Smart Classroom In the schematic figure of our Smart Classroom there're five dedicated agents (except for the Facilitator agent of OAA). The Facial-voice identification agent is in charge of the Smart Classroom's login identification and authentication. When a person entering the room, he is required to place his face into a specific zone of a video camera's capture range, and speak a login word. The vision-part of the agent identifies the person by searching in a pre-trained user library, and the voice-part authenticates the identified person by voice-based speaker recognition. The motion-tracking agent is a computer vision-based agent. There's a pan-tilt video camera mounted on the upper side of the front wall, monitoring the whole range of the room. The motion-tracking agent receives video stream input from the camera and tracks the lecturer's position and movements in the room. When lecturer enters /leaves the teaching area, motion-tracking agent will signal the corresponding events to the agent society. Voice Command " ' ' ' • Agent ^ilz-Vi Motion Track p) Agent Virtual Mouse Agent Figure 3. Five dedicated agents in OAA model
  • 44. 23 The voice command support of Smart Classroom is realized by a speech recognition agent, which can perform speaker independent and continuous voice recognition. We use IBM's simplified Chinese version of ViaVoice SDK to wrap the voice recognition agent. The agent receives digitized signals from a wireless microphone, which is carried by the lecturer. And then recognizes its command within a dynamically loaded vocabulary set. Once a recognizable command is reached, the voice recognition agent dispatches that command to the agent society. Other corresponding agent is responsible for the execution of that command. The Virtual Mouse agent is used for handling hand-gesture, which stimulates the mouse events and shortcut command to activate operations on the playing courseware. It's also a vision-based agent. There are two video cameras specialized for virtual mouse event recognition. One is installed on top of the screen, the other is mounted on the ceiling of the room. Through detecting and analyzing 3D movements of hand, gestures can be recognized. The virtual mouse agent then dispatches the recognized mouse event or shortcut command to the agent society. Figure 4. How virtual mouse agent works SameView agent plays a core role in our Smart Classroom's pedagogical scenario. It is based on a legacy desktop application, namely SameView [Pei 1999, Liao 2000, Tan 2000], which is developed by media group of our institute. The purpose of SameView is a software for supporting multimedia based group discussion whose members are spaciously distributed and connected by heterogeneous networks. SameView has the following features: a shared MediaBoard (multimedia extensions to traditional electronic whiteboard), adaptive multimedia contents trans-coding according to terminal's network Qos and computing power, adaptive reliable multicast in wide range of heterogeneous
  • 45. 24 networks, live capture of video/audio streams and multimedia events into self-defined multimedia compound document, post-edit and playback of the captured multimedia compound document, self-equipped authoring tools for courseware-editing. In our Smart Classroom, we recur to the SameView's desktop version code as much as possible. We only revised some of its input/output user interface, such as adding a separate Student Board for display of remote students information and status by exploiting dual display adapter card support of Microsoft Windows 98/2000, projecting the Media Board in full-screen mode to remove the vestiges of desktop software with Windows-style menu, toolbar, title bar, etc. The most crucial reformation to SameView is the wrapping of it as an autonomous agent in Smart Classroom's agent community, which enables it to receive user's natural input from other dedicated agents like voice command recognition agent and virtual mouse agent, and then behave interactively. 5 Conclusion: Future Goals for Smart Classroom Our current stage Smart Classroom is a primitive prototype of futuristic classrooms, which attempts to embody some of its distinguishing features like natural user interface, capture of class events and collaborative support. It is still far from a real Smart Classroom. Its resolutions to some key problems in Intelligent Environment are simple, intuitive and somewhat application- specific. Although many research issues need to be addressed in order to realize genuine Smart Classroom, we stride forward the first step toward the ambitious goal. In the near future, we'll make efforts in enhancing the Smart Classroom in some of the following aspects. Add more modalities and applications. We'll try to equip some more modalities of human inputs like vision-based tracker, embedded microphone array and various distributed sensors to sense human's context. And progress in the sensing technologies needs to be matched by progress in applications that use sensed information. Application is one of the key driving forces of technical advance. We'll conceive more realistic and useful scenarios in the Smart Classroom and also cooperate with different research groups whose application projects have high potential to take advantage of the capability of Smart Classroom. We believe the rise in the amount and sort of applications will enable generalization of Smart Classroom's design and implementation. Add a brain. The current design implementation of the Smart Classroom focus on the human's natural input to the computing environment, the next step is to move to a higher level and to give it the ability to understand. It is not just to utilize multimodal interface, but also to add-on context-aware intelligence. The classroom should be able to reason human's intention through analysis of all the gathered
  • 46. 25 inputs and proactively serve its occupants. There is some research studies in reasoning human's intention based on predefined grammars [Johnston 1998] or probabilistic statistical model. Each of them has innate weakness. We'll try to explore the combination of them. Add multi-user interaction. In the current stage Smart Classroom, there is only one user (lecturer) naturally interacting with the Intelligent Environment Other attendants are just observers or listeners and are not able to exploit the fascinating features of natural interaction. Because a class is bound to have multiple participants, to make a qualified Smart Classroom, we need to enhance the classroom's support for multi-user interaction. In our next step, we'll empower the classroom with capability to track and identify more than one user dynamically, and enable Smart Classroom's in-place service to every user in the room. Reference 1. [Winograd 1999].Winograd, Terry. Toward a Human-Centered Interaction Architeture. 1999. http://www.graphics.stanford.edu/ projects/iwork/papers/ humcent/index.html 2. [Weiser 1991]. Weiser, Mark. The Compu- ter for the 21st Century. Scientific American, pp. 94-10, September 1991. http://www.ubiq.com/hypertext/ weiser/SciAmDraft3.html 3. [Weiser 1993]. Weiser, Mark. Ubiquitous Computing. IEEE Computer "Hot Topics", October 1993. http://www.ubiq.com/hypertext/weiser/ UbiCompHotTopics.html 4. [Weiser 1994]. Mark Weiser. The world is not a desktop. Interactions, pages 7-8, January 1994. http://www.ubiq.com/hypertext/weiser/ ACMInteractions2.html 5. [Coen 1999]. Coen, Michael. The Future Of Human-Computer Interaction or How I learned to stop worrying and love My Intelligent Room. IEEE Intelligent Systems. March/April. 1999. 6. [HAL 2000] MIT AI Lab HAL Project (previous Intelligent Room project), 2000. http://www.ai.mit.edu/projects/hal 7. [Mozer 1999]. Mozer, Michael C. An intelligent environment must be adaptive. IEEE Intelligent Systems. Mar/Apr. 1999 8. [eClass 2000] Georgia Tech, eClass Project (previous Classroom 2000) 2000 http://www.cc.gatech.edu/fce/eClass/ 9. [Abowd 2000]. Abowd, Gregory. Classroom 2000: An experiment with the instrumentation of a living educational environment. IBM Systms Journal, Vol. 38. No.4 10. [Interactive Workspaces 2000]. Stanford Interactive Workspaces Project. http://graphics.stanford.edu/projects/iwork
  • 47. 26 11. [Fox 2000] Fox, Armando, et al. Integrating Information Appliances into an Interactive Workspace, IEEE CG&A, May/June 2000 12. [Aware Home 1999]. Georgia Tech, Aware Home Project,1999 http://www.cc.gatech. edu/fce/house 13. [Kidd 1999]. Kidd, Cory D., Robert J. Orr, Gregory D. Abowd, et al. The Aware Home: A Living Laboratory for Ubiquitous Computing Research. In the Proceedings of the Second International Workshop on Cooperative Buildings - CoBuild'99. Position paper, October 1999. 14. [DreamSpace] IBM Research. http://www.research.ibm.com/natural/ dreamspace/index.html 15. [EasyLiving] Microsoft Research, http://www.research.microsoft.com/vision 16. [OAA]. SRI. http://www.ai.sri.com/~oaa 17. [Johnston 1998]. Johnston, Michael. Unification-based multimodal parsing. In the Proceedings of the 17th International Conference on Computational Linguistics and the 36th Annual Meeting of the Association for Computational Linguistics (COLING-ACL 98), August 98, ACL Press, 624-630. 18. [Ren 2000]. Ren, Haibing, et al. Spatio-temporal appearance modeling and recognition of continuous dynamic hand gestures. Chinese Journal of Computers (in Chinese), 1999. Vol 23, No. 8, Agu.2000, pp.824-828. 19. [Pei 1999]. Pei, Yunzhang, Liu, Yan, Shi,Yuanchun, Xu, Guangyou. Totally Ordered Reliable Multicast for Whiteboard Application. In proceedings of the 4th International Workshop on CSCW in Design, Paris, France, 1999. 20. [Tan 2000]. Tan, Kun, Shi, Yuanchun, Xu, Guangyou. A practical semantic reliable multicast architecture. In proceedings of the third international conference on multimodal interfaces,BeiJing,China,2000 21. [Liao 2000]. Liao, Chunyuan, Shi, Yuanchun, Xu, Guangyou. AMTM - An Adaptive Multimedia Transport Model. In proceeding of SPIE International Symposia on Voice, Video and Data Communication, Boston, Nov. 5-8, 2000.
  • 48. H Y B R I D JINI F O R L I M I T E D D E V I C E S V I N C E N T LENDERS, POLLY HUANG AND MEN MUHEIM ETH Zurich E-mail: {lenders, huang}@tik.ee.ethz.ch, men@ife.ee.ethz.ch We envision a future of heterogeneous mobile devices collaborating spontaneously and bringing convenience to life. Taking a practical approach, we study the feasi- bility of integrating limited devices into the Jini, Java, and Linux paradigm. With careful evaluation and system hacking, we manage to fit the software stack, ex- cluding Java's Remote Method Invocation (RMI) support, in a small 1.85-Mbyte space. However, we also identify that including RMI support will exhaust all the remaining space. We propose, as a short-term solution, to re-implement Jini with light-weight communication alternatives and to use a hybrid lookup server to inter-operate RMI- and non-RMI-supported devices. For the long term, we advo- cate minimalism and call for community-wide standardization effort to the system software development. 1 Introduction We envision a future that computers and electronics will be mobile and collab- orate spontaneously, bringing convenience to life. Two immediate problems before realizing such a future are ways to handle heterogeneity and mobility of these devices. These devices, for example mini-laptops, mobile phones, and home appliances have very distinct hardware and software profiles. The task of configuring and inter-operating them will be too difficult for average users, not to mention that these devices are likely to be mobile and whenever they enter a new environment they need to be re-configured. To counter the problems of automatic configuration and seamless inter- operation, the industry and research community have offered a few solu- tions 1>2 that encompass (1) a resource discovery/management protocol and (2) a framework of uniform programming interface and code base. One promi- nent example is the Jini 3 and Java 4 combination. In the Jini/Java paradigm, devices can come and discover (or be discovered by) resource in the network automatically. While responding, the devices register proxies allowing other members in the network to operate them. As a feasibility study, we are building such a Jini/Java-based spontaneous network with various types of devices, mainly full-fledged computers, mobile PCs, and limited electronics. Connecting limited electronics is the most inter- esting and challenging case. By limited electronics, we mean personal, home, or office electronics. They are essentially micro-computers with compact sys- 27
  • 49. 28 tem architectures and limited flash memory, and sometimes also referred to as embedded systems. Taking a hands-on approach, we set ourselves off to install the Jini/Java stack on a development board for embedded systems. This turns out to be a non-trivial task and gives rise to a serious system software problem - its size. It is profoundly difficult just to fit a native Jini/Java/Linux stack onto a typical embedded system board, not to mention extra applications required to run on top of the system stack. After intensive system hacking and careful evaluation, we find bottleneck of the size problem being Java's Remote Method Invocation (RMI) support. It is humongous, relatively to other parts, and current implementation of Jini depends on it. While RMI offers elaborated remote execution support, it is not really necessary for communication in Jini which can be rather primitive. We propose, as a solution to scale system software size, a light-weight Jini implementation based on IP socket or XML. That is to implement Jini without using any RMI interfaces and avoid including RMI support in the software stack at all. To warrant backward compatibility with existing implementation, we take a hybrid approach to differentiate existing RMI-based and the light- weight implementations, thus enabling execution of non-RMI proxies on RMI- supported devices but not the other way around. More importantly, we call for standardization activities towards defining minimum system software stack for mobile devices. In the meantime, we urge developers to refrain from RMI and the community to re-examine its scalability. In short, our contribution includes a) a successful port of system kernel and free-license VM for limited devices, b) a qualitative and quantitative eval- uation of a minimum software stack, c) a 35% reduction of the Jini/Java/Linux stack without RMI support to 1.85 Mbytes, and d) a light-weight hybrid Jini solution to overcome the system software size problem. 2 Approach Jini devices require hardware platforms with network connectivity and the ability to execute Java code. Two different minimal hardware approaches are possible. The first solution is an embedded device with network connectivity that runs a Java Virtual Machine (VM) on top of any kind of operating system. Typical embedded devices of this kind are the Developer Board LX from Axis 5 and the NetSC520 Demonstration Platform from AMD 6 . Both platforms run embedded Linux and communicate via Ethernet. The second solution is to use embedded boards with Java processors. Unlike traditional microprocessors,
  • 50. 29 which must convert Java byte-code into the processor's native language, these processors can operate directly from Java byte-code. aJile Systems 7 provides a development board with their Java processor called aJile. Another solution is provided by Systronix 8 . They developed a hardware Java platform with their Tiny Network Module (TINI). We decided to use the Developer Board LX from Axis for our further implementations. This board provides the best scalability regarding resources, size, and price. It has the following features: 100MIPS 32 bit CPU, Ethernet 10/100Mbps, 2 RS-232 serial ports, 2 parallel ports, 2 Mbyte FLASH and 8 Mbyte DRAM. The FLASH size can be updated to 4 Mbytes. Operating Jini on this platform with restricted resources requires strict size limitations regarding the operating system and the VM. Linux suits well as target operating system for our device. The two main reasons are the compact size of Linux and its open license policy. We use a Linux port as operating system. Different Java versions from different parties are candidates to be ported to the developer board. Sun Microsystems introduces the Java 2 Micro Edi- tion (J2ME) 9 as Java platform for limited devices. J2ME is divided in two complementary configurations: the Connected Limited Device Configuration (CLDC) and the Connected Device Configuration (CDC). Both configurations introduce a new VM. The CDC contains the C virtual machine (CVM) and the CLDC contains the K virtual machine (KVM). CLDC would probably better suit for the developer board. Kaffe 10 is an open implementation of Java for embedded and desktop systems. It is an implementation of the PersonalJava 3.0 specification and re- quires no source code licenses from Sun Microsystems. The major advantages of Kaffe are: compact size, easiness of porting to new platforms (operating systems and architecture), and it is open source software. For these reasons, we decided to use Kaffe instead of J2ME for our implementation. 3 Evaluation The main task of this work is to fit the required software on the 4-Mbyte FLASH ROM. The required software includes the operating system, VM, Jini core classes and Jini service classes. Embedded Linux. The CPU on the developer board is the ETRAX 100 LX. The source code of Linux 2.4 includes the CRIS architecture for ETRAX 100 LX. Axis provides a small distribution of Linux for their developer board. We have optimized this distribution and reduced the size of the operating system (kernel and basic utilities) to 800 Kbytes (55 % of the original size).
  • 51. Other documents randomly have different content
  • 52. It. to Robert Bageley pryor vjli. It. to Henry Benett vjli. It. to George Farny vjli. It. to Rauffe Motsett cvjs. viijd. It. to Randall Barnes cvjs. viijd. It. to Willm Crosse cvjs. viijd. It. to Robt. Cheryngtoun cvjs. viijd. It. to Edmund Boultoun cs. It. to Willm prowluffe cs. It. to Thomas loke xls. It. to Rychard Cordon xls. It. to John Bykertoun xls. Summa cxvli. vjs. viijd. Fees and Annuites graunted owt by Couent sealle before the dyssolucon of the seid late Monastery Fyrst to my lorde of Darby stuard of the seid Monastery & the towne and maner of loke xls. It. to Rychard Grosuenour stuard of pultoun xxvjs. viijd. It. to Vmfrey Witney Balyffe of all the lorsheppes & Maners belonging to the seid Monastery Wythin the Countye of Chester lxvjs. viijd. It. to Willm Damport Balyff of all the lordshyppes & maners of the seid late Mon. in the Countye of Stafford except the Toune of loke iiijli. It. to Robt. Burgh forester of the forest of loke belongyng to the seid late Monastery [sic] It. to John Cordoun Balyffe of the toune of loke xxs. It. to John Alynn Balyff of Rassall Norbroke & bysshopham xxvjs. viijd. It. to Richard Dann late stuard of housholde ther lxs.
  • 53. It. to Henry Beretoun xls. It. to Roger Williamson xxvjs. viijd. It. to laurence plunte xxs. It. to John Wytney xxvjs. viijd. It. to Robt. Warmyngton xls. It. to Thomas Wytney xxvjs. viijd. It. to Jamys Coke xxs. It. to William Halme xiijs. iiijd. It. to Thomas Redhed xls. It. to Jamys Statheham xls. It. to Nycholas Witney lxvjs. viijd. Summa xxxiiij li. Dettes owyng by the seid late abbot to diuers psons as folowyth Fyrst to Henry Hargraues of luddyngtoun xxixli. iiijd. It. to Elyzabeth Alenn of Rossall xxijli. It. to John Alenn of Rossall iiijli. It. to the Wydow Amrye of londin vjli. It. to Helyn fitton of Sidingtoun xvjli. xiijs. iiijd. It. to Robt. Burgh for oulde dette lxixs. ixd. It. to Thomas Heth viijli. vjs. viijd. It. to Robt. Myddeltoun of Islyngtoun xxxs. It. to Thomas Maynewaryng of londondon [sic] xxvjs viijd It. to Thomas Ball of Chester xlvjs viijd It. to Jamys Colyar viijli. xvs. vijd. It. to Robt. Wandell lxvjs. viijd. It. to Willim Nyckted person of Rollestoun xlvjs. viijd. It. to John lokker chepelleyn of ypstons xxxvs. viijd. It. to Willm Heth of parkelown xvs. It. to Roger Williamson iiijli. It. to John Higgenboth xxviijs. iiijd. It. to John gudwyn Chapelayne of Chedton iijs. iiijd. It. to Hery bennett vjli. xiijs. iiijd. It. to Thomas Hattoun xliiijs. It. to Richard Hyggenbothe xvs. vjd. It. to John Cheryngton xls.
  • 54. It. to the pisshionors of Sandbath vjli. It. to Willm Dauenport xxvs. It. to Vmfrey Reynould ciijs. iiijd. It. to John Hale iijs. It. to Richard Vygors xvjs. It. to John Wood xxiijs. It. to Roger Tatton xs. It. to John Fayrfeld xijs. iiijd. It. to Hugh palenn ixs. It. to Henry Symson viijs. It. to Rychard Hergreues xxxjs. viijd. It. to John Feny ixs. viijd. It. to Thomas Cattoun ijs. It. to James Coke xlviijs. ix d. It. to Xpofer Crowther iijs. iiijd. It. to Edward plummer vijs. iiijd. It. to Jamys Vygors taylor xiijs. xjd. It. to Willm Rame of Newboulte xli. It. to Sr. Thomas Arundell Knyght liijs. iiijd. It. to Sr. Robt. Nedham Knyght xxxiijs. iiijd. It. to Robt. Warmingtoun for hys fee xxs. It. to Dan Wllm Crosse xls. It. to Willm feni lxs. Summa clxxjli. xs. vjd.
  • 56. APPENDIX VI THE SALE OF THE GOODS AT THE GREY FRIARS, STAFFORD (British Museum, Addit. MS. No. 11,041, fol. 86b) The Grey ffryers of Staff. surrendryd The Sale of goodes ther made the xxvijth day of September, anno xxxmo. Henrici viijui ., as herafter followyth Kechyn Sol. Fyrst, sold to the warden of the seyd fryers ij brasse pottes viijs. Sol. Item, ij brasse pottes, sold to Edward Scudamour iiijs Sol. Item, sold to the towene of Stafford ij Church candelstyckes vs. Sol. Item, sold to the seyd Scudamour ij coberds, (xiid.); a cobert; a spytt, (vid.); and a tryvett xviijd. Sol. Item, sold to the wardene vj platters ijs. Sol. Item, a fryeng panne (iiijd.) and a peyre (ijd.) of pothangles, sold to the seyd Scudamour vjd. Sol. Item, ij pannes, sold to ... vid. Sol. Item, sold to the bayliff of Staff. a potthangles viij. d. Summa xxijs. ijd. Butterie Sol. Item, sold to Doryngton, a gret basen xxd. Summa patet Churche Sol. Item, a cope of tawny damaske xijd. Sol. Item, a vestment and ij tynakles of old prest velvet, sold to John Savage baylyf xiijd. iiijd. Sol. Item, sold to Thomas Williams ij copes of redd tartarne xiid.
  • 57. Sol. Item, a sute of blue sarcenet, sold to Thomas Cradock iijs. iiijd. Sol. Item, a sute of grene branchyd sylk, sold to Mr. Offeley vj. viijd. Sol. Item, ij tynakles of dunne sylk, sold to Pereson xxd. Sol. Item, ij auter clothes, sold to Robert Doryngton xijd. Sol. Item, a cope of lynyn cloth steynyd, sold to a fryer iiijd. Sol. Item, ij table clothes, sold to John a Lee vjd Sol. Item, ij corperas casys, sold to the prior iiijd. Sol. Item, a corperas, sold to the wardens of the churche iiijd. Sol. Item, sold to William Bentrey a stremer of lynyn clothe iiijd. Sol. Item, a vestment of blue fustian and one of whyt diaper, sold to fryere Wood vjd. Sol. Item, a sute of vestmentes of yolowe say, sold to Edward Rogers xijd. Sol. Item, sold to John Webbe the tymber worke in the hyegh quyer, and a auter of alablaster in the body of the churche ixs. viijd. Sol. Item, sold to Rychard Lees all the setes vjd. Sol. Item, a table of allablaster standyng in the church, sold to Mr. Loveson ijs. viijd. Sol. Item in Seynt Fraunces chapelle all the seates, sold to Robert Doryngton iiijd. Sol. Item, a image of Seynt Katerine, sold to ... Lee vjd. Sol. Item, sold to Robert Doryngton, old bokes and a cofer in the library ijs. Sol. Item, sold a old peyre of portatyffe organs to Mr. Lvsun ijs. Sol. Item, an old cofer, in the vestry, sold to Janys Clement ijs. viijd. Sol. Item, old wexe, sold to Robert Doryngton iiijd.
  • 58. Sol. Item, a lampe, sold to Robert Doryngton viijd. Sol. Item, old bokes in the vestry, sold to the same Robert viijd. Sol. Item, sold to Robert Whytgreve, a missale viijd. Sol. Item, ij aulter candelstyckes and a pykes of copper, sold to Mr. Swynnerton xijd. Sol. Item, a bere franke, sold to ... ijd. Summa lvs. viijd. Bruehouse Sol. Item, sold to the vnder baylyff and to the late warden of the Fryers iij leades, one to brue in, and ij to kele in, fates,[246] iiij tubbes, a bultyng hutche, and a knedyng trowghe xiiijs. viijd. Sol. Item, ij peces of tymber lyeng in the bruehouse, sold to Bagnoll iiijd. Summa xvs. Hall Sol. Item, a table on the north syde of the hall sold to Robert Danes xvjd. Sol. Item, sold to the hyeghe baylyff, the table on the sowth syde of the hall xvjd. Sol. Item, sold to Robert Wetwood, the table at the hyeghe deske viijd. Summa iijs. iiijd. Buyldynges Item, sold to Jamys Lusone esquyer all the church and quyer, with all edyfyenges and buyldynges within the precinct of the Fryers Minours surrendryd, with all the stone, tymber, tyle, glasse, and iron in the same, ledd and belles only exceptyd, and also exceptyd and reservyd the stone wall next unto the towne of Stafford xxixli. xxd. pro. qua quidem summa prefatus Jacobus obligat. inter al.
  • 59. ad solvend. ad fest. Pur. beate Marie et Nativitat. sancti Johannis equal. Sol. Item, sold to the towneshyp, the wall of the Fryers next unto the towne iijs. iiijd. Summa xxixli. vs. Sum of all the goodes and buyldynges of the seyd ffryers sold xxxiiijli. iijs. xd. R’ by John Scudamour esquyer, r. cjs. ijd. Item, ij belles, one a sauncebelle,[247] the other by estimation Xcth, in the custodye of Mr. Luson. Item, in ledd upon the quyer and a chapelle by estimation xlv. fotes brode of bothe sydes and xliij fotes long, in the custody of baylyffes of Stafford.
  • 61. APPENDIX VII THE SALE OF THE GOODS AT THE AUSTIN FRIARS, STAFFORD (British Museum, Addit. MS. No. 11,041, fol. 87b) The Austen Fryers of Staff. The sales of goodes ther made the xxvijth day of September, anno xxxmo Regis Henrici viij. Church Sol. Fyrst, sold to Mr. Whytgreve, a masse boke xijd. Sol. Item, a cope of blake chamlett, sold ijs. R.B. Item, a vestment and ij tynaklez of blake say with albes and amyses, etc., sold to Richard Ward iiijs. R.B. Item, a vestment and ij tynakles of tawny sarcenett, sold to ... iiijs. R.B. Item, a vestment and ij tynakles without albes of bawdekyn with images of our lady, sold to Mr. Luson xviijd. R.B. Item, ij tynakles with albes, bawdekyn with bryddes, sold to ... Affley iijs. iiijd. R.B. Item, a syngle vestment with a albe and a blake orferuns, sold xxd. R.B. Item, a vestment of redd fustyan with ij albes ijs. viijd. Sol. Item, ij old copes, one of grene and another of old badkyn parke worke ijs. R.B. Item, ij copes grene and yolowe partye Colowryd and rewyd, sold to Mr. Luson xxijd. R.B. Item, iiij corperas casys viijd.
  • 62. R.B. Item, a peyre of censours, sold to Thomas Browne iiijd. R.B. Item, a vestment of white bustion, sold to the prior viijd. I.S. Item, ij candelstyckes xvjd. I.S. Item, a alter cloth viijd. I.S. Item, old bokes in the quyer vjd. R.B. Item, a pulpytt iiijd. I.S. Item, ij ladders viijd. R.B. Item, a table of alablaster (iijs. viijd.) and a dore (iiijd) sold to Mr. Stamford iiijs. R.B. Item, the hyegh alter, sold to Mr. Stamford iijs. R.B. Item, the bordes of the altar of the northe syde of the church viijd. I.S. Item, ij grave stones of alablast, sold to ... Wolrych xijd. I.S. Item, the organs, sold to Mr. Offeley xxvjs. viijd. Hall I.S. Item, a table in the old hall with ij trestylles iiijd. R.B. Item, a table in the inner hall, with ij trestylles and ij formes, sold to Robert Doryngton viijd. Bruehouse R.B. Item, a bultyng table, sold to Margarett Whytfyld ijd. R.B. Item, a furnes of ledd, sold to Mr. Stamford vjs. Kechyn I.S. Item, a great pot and a lesse iijs. iiijd. R.B. Item, iij pannes of brasse ijs. viijd. R.B. Item, iij platters, a dysshe, and a sawecere xijd.
  • 63. R.B. Item, a trevett iiijd. Summa lxxixs. Buyldynges. rec. xls. Item, sold to Jamys Loveson esquyer, Thomas Picto, and Richard Warde, all the tyle, shyngle, tymber, stone, glasse and iron, one marble graue stone, the pauementes of the church, quyer, and chapelles, with rode lofte, the pyctures of Cryst, Mary and John, beyng in the church and chauncell of the Austen Fryers, besydes the towne of Stafford, surrendryd with all other superfluos edyfyes and buyldynges within the precynct of the seyd Fryers, to be takyn downe, defacyd, and caryed awey by the seyd Loveson, Picto, and Ward, at there owne proper costes and charges, and to pay for all the premysses to the Kyng and hys heyres, successors and assignes xxviijli. viijs. iiijd. Inde sol. pro Picto xls. et rem. xxvjl. viijs. iiijd. pro qua quidem summa Jacobus Loveson de Woleverhampton. Ar. obligat. inter al. ad solvend.ad fest.>br>Pur. beate Marie virginis et Nat. Sancti Johannis prox. equal. ut patet obligac. dat. Sept. anno xxxmo. regis enrici viij rem. cum J. Scudamour ar. rec. partic. Sum of all the goodes and edyfyenges forseyd in the Austen Fryres sold xxxij. vjs. viijd. Rec. per J. S. cxviijs. Super. pro edific. xxvjli. viijs. iiijd. Item, there remaynyth in the custodye of Robert Burgoyne, audytour, one playne crosse of copper, with a lytle image of Cryst sylver apon hyt, iijs. iiijd.
  • 64. worth by estimation Item, remaynyth in the custodye of John Scudamore esquyer, particuler receivor etc., one lytle woodden crosse platyd over verry thyn with sylver, worth by estimation xijd. Item, ther remaynyth in the steple one belle, by estimation x Cth in the custodye of Thomas Picto, worth by estimation viijli. Item, one lytle belle in the steple, weyng by estimation di. Cth, worth by estimation viijs.
  • 66. APPENDIX VIII THE SALE OF THE GOODS OF THE GREY FRIARS, LICHFIELD (British Museum, Addit. MS. No. 11,041, fol. 88b) Prisours Robert Ryve William Colman Marke Wyrley Thomas Fanne jurati. Grey Fryers of Lychefyld The Sales ther made the iiijth day of October, anno xxxo regis Henrici viijui Sol. ffyrst sold to Mr. Strete all the copes, vestments, and tynakles in gros for xls. Sol. Item, sold to the seyd Mr. Strete ij > candelstyckes of latten viijd. Sol. Item, the pauyng tyle in both the cloysters, sold to Mr. Strete xls. Sol. Item, sold to Thomas Bardell, ij candelstykes viijd. Sol. Item, sold to Sir Thomas Dobsone, a presse, a bedstede, and a dore iiijd. Sol. Item, the tymber, tyle, and stone of the old hostery and the ffermery, sold to Rychard Rawson iiijli. Sol. Item, the tyle and tymber of the lytle cloyster, sold to John ap Gl’m. xiijs. iiijd. Sol. Item, ij worte leddes[248] in the bruehouse, sold to John Sandelond vjs. viiijd.
  • 67. Sol. Item, sold to Mr. Aston, a wynd ijs. Sol. Item, sold to Thomas Fanne, the brycke wall at the churche ende ijs. Sol. Item, sold to the master of the Ile, > a fate in the bruehouse iiijd. Sol. Item, sold to Chapman, a fate xijd. Item, sold to John Genynges, the tymber, tyle, and stone of the stable buttyng upon the churche ende iiijli. Item, sold to John Mylward, the tymber, tyle, and stone of the iij houses joynyng together in the court callyd the Tenys Court xls. Item, sold to Rychard Ballard, the lytle house over the ovyn iijs. iiijd. Item, sold to Mr. Ryce, mastres Warden, mastres Stonye, vij leddes for wort xviijs. Item, the tymber, tyle, and stone of the kechyn and the bruehouse, sold to Edward Spratte liijs. iiijd. Item, sold to John Laughton, a cofere and a hutche in the buttery xijd. Item, the cesterne of ledd, and the stone that hyt standyth in, in the kechyn, sold to John Genynges xiijs. iiijd. Item, the glasse that ys lewse in the newe loggyng, sold to William Colman iijs. Item, a lampe, sold to Edmund Bardell viijd. Item, the presse in the vestrye, sold to the warden of the gyld xvjd. Item, ij hutches, sold to Mr. Warden viijd. Item, a fryers masse boke, solde to Marke Wyrley iiijd.
  • 68. Item, the stone wall betwene the old ostery and the ffrater, sold to John Sadeler vs. Item, the pauement of the quyere, sold to Mr. Stretes xiijs. iiijd. Item the fryers setes in the quyere, sold to John Laughton vjs. viijd. Item, the cundyt of ledd in the cloyster, sold to the master of the gyld and his brethern xxxs. Sol. Item, a holy water stocke, sold to John Howlat xxd. Sol. Item, all the kechyn stuff, sold to master warden of the gyld xxs. Sol. Item, ij standert candelstyckes, sold to the seyd master warden viijs. Sol. Item, the lytle cundyt standyng at the revestrye dore, sold to George Stonyng vs. Sol. Item, the cesterne of ledd standyng in the porche at the Tenys Court ende, sold to Mr. Lytleton xxs. Sol. Item, a lytle porche standyng by the dwellyng house, sold to Mr. Lytylton xs. recepi xxjli. iijs. iiijd. Item, the ffrayter and the chambers stretchyng to the kechyn, with all the quadrant of the inner cloyster joynyng to the church and steple, and the church and quyer, and the long newe house of the est syde of the same cloyster, except and reseruyd ledd, belles, pauement, and grauestones within all the seyd buyldynges, save only the pauement of the seyd churche, whyche ys parcell of the seyd bargayne, sold to John Weston of Lichfeld, John Archer, Richard Cotes, gent., Hugh Bowde, Harry Hopwood draper, Michaell Hyll, John Genynges and John Mylward, and hath day to deface the steple, cloyster, and quyer forthwyth the churche, onles they obtayne lycens otherwyse of the Kyng and hys councell, athys-side the feast of the Purification of our Lady next commyng, and for all the residewe of the buyldynges iij yeres day[249] to pull xlijli. xiijs. iiijd. Inde sol. J. S. xxjli. iijs. iiijd. Et rem. xxjli. xs. pro qua quidem summa Johannes Weston, Johannes Archer, Ricardus Cotes et
  • 69. downe and carye awey, and to have egresse and regresse for the same Hugo Bowde, obligat. ad sol. ad fest. sancti Michaelis archangeli prox. ut patet oblig. dat. quinto die Octobr. anno regni regis Henrici viijui. xxx. rem. cum Johanne Scudamour, ar. r. partic. etc.
  • 71. APPENDIX IX THE SALE OF GOODS AT CROXDEN ABBEY (British Museum, Addit. MS. No. 11,041, fol. 89b) Crokesden—The sales ther made the xvth day of October, anno xxxo regis Henrici viijui as herafter followyth: Sol. Item, a lytle gatehouse on the north syde of the comyn wey, sold to Mr. Bassett xiijs. iiijd. Sol. Item, sold to Mr. Bassett, the loft under the organs xs. Sol. Item, sold to Mr. Bassett, the lytle smythes forge iiijs. viijd. Sol. Item, the bott of an asshe sold xxd. Sol. Item, the roffe of the churche, sold to Sir Thomas Gylbert and Edmund Wetheryns of Chekeley parysshe vjli. r. xxxiijs. Item, the roffe of the dorter,[250] sold to Mr. Bassett xxxiijs. iiijd. Sol. Item, sold to John Ferne, all the old tymber in the cloyster vjs. viijd. Summa, ixli. ixs. viijd. oneratur.
  • 72. Welcome to our website – the ideal destination for book lovers and knowledge seekers. With a mission to inspire endlessly, we offer a vast collection of books, ranging from classic literary works to specialized publications, self-development books, and children's literature. Each book is a new journey of discovery, expanding knowledge and enriching the soul of the reade Our website is not just a platform for buying books, but a bridge connecting readers to the timeless values of culture and wisdom. With an elegant, user-friendly interface and an intelligent search system, we are committed to providing a quick and convenient shopping experience. Additionally, our special promotions and home delivery services ensure that you save time and fully enjoy the joy of reading. Let us accompany you on the journey of exploring knowledge and personal growth! ebookultra.com