Epoch Proxy Laptop
Section 1:
Group Members and Contributions:
Samuel Asakiewicz – Software Designs
Rodrigo Gualberto – Functionality
Jan Cruz – Hardware Designs and Diagrams
Gregory Stormes – Design Constrains, Ethical Responsibilities
Section 2:
Hardware Designs:
The implementation of hardware components onto the proxy laptop is a fairly straightforward task since it will not deviate from the regular netbooks seen on-market today. The Major differences in Implementation strategies will heavily lie on the configuration of the Remote Desktop Software used.
Hardware Implementations
The block diagrams are on the following pages.
Implementation #1
CPU: Intel Atom N2800
Display: LED Backlit HannStar HSD100IFW4-A
Storage: OCZ VERTEX 2 SSD SATA II 40GB
Power: 12 – Cell Lithium Ion
Memory: Single DIMM 1GB
Connectivity: TI WL1271-TiWi from Texas Instruments (Wifi and Bluetooth)
SouthBridge: Intel ICH10
Implementation #2 (Best Implementation)
Removed VGA Out and Card Reader
CPU: Intel Atom N2600
Display: LED Backlit HannStar HSD100IFW4-A
Storage: WD Scorpio Blue WD1600BPVT 160GB
Power: 6 – Cell Lithium Ion
Memory: Single DIMM 1GB
Connectivity: TI WL1271-TiWi from Texas Instruments (Wifi and Bluetooth)
SouthBridge: Intel ICH10
Considering the functions of the proxy laptop Implementation #2 is the best design.
- The extra graphics power of the Atom N2800 (640Mhz) is unnecessary for a proxy laptop that only needs to display a signal processed by a remote computer. The N2600 (400Mhz) is fine for this case.
- Although the proxy laptop relies on Cloud computing and need not a large storage space, the 160 GB WD hard drive was chosen over the much faster 40GB Solid State drive because of price. The performance that the Solid State drive gives does not offset it’s higher price tag since accessing speed is not a major need when connecting with a remote computer.
The 6-Cell Lithium Ion Battery (8 Hour Lifespan) is better for this project because all major computing will be done by the remote computer. Most of the power would be concentrated only on the display and the wireless connectivity.
Hardware Block Diagrams:
Software Designs:
The Remote desktop software considered for the proxy laptop is Remote Desktop Services by Microsoft and VNC (various forks) which are GNU licensed. These two Remote desktops software are the two most widespread in addition to being the two most versatile and diverse Remote desktop software programs. As such, these are the two most practical RD programs.
Remote Desktop Services is usable on all modern windows operating systems. It has been developed as a bare boned terminal service for thin-PCs in addition to being developed for full-fledged desktops, making the software extremely capable of performing the desired remote desktop functions the proxy laptop will require while still being well optimized for the machine. It is convenient program to use due to its incorporation into the base install of many windows operating systems. With little extra fuss the proxy laptop could easily connect to other windows machines (for use by friends or family) without demanding technical finesse.
VNC is similar to Microsoft's Remote Desktop Services, with the exception that is GNU licensed freeware. It has also been developed into a numerous variations for an expansive set of purposes, by dedicated programmers in their free time. Due to all the various forks coming from a single core program, most VNC variations are compatible, allowing for a bare boned version developed for a minimalistic thin-PC to remote into a fully-fledged version design for a full desktop running the most recent of Linux, PC, or Mac installments
Remote Desktop Services and VNC forks operate by very similar functionalities and protocols. The only major difference between the two programs will be extra feature sets and optimization for particular machines or operating systems. Both are more than capable of performing the task the proxy laptop system demands.
Functionality:
The basic idea behind a Remote Desktop system is simple. The computer that is being accessed, here forth known as the host, begins by requesting access credentials from the connecting computer, here forth known as the client. Once the credentials have been approved, the host sends a constant stream of display data to the client. The client can then begin using the host as if it was the local client itself. The actions performed on the client’s physical system are transmitted to and processed by the host once it receives the data. Certain actions, like keystrokes on the client’s keyboard, are processed in real time so that the host can respond to the action immediately even though the client could be miles away.
The “Epoch Proxy Laptop” we are designing will have the ability to connect to a host either through a local network or through the internet. The process through which this happens is detailed in the following list:
1. An action, usually a keystroke or mouse click, that initiates another action is executed on the client.
2. The command gets processed on the client’s computer and sent to the installed network card.
3. The network card then packages the data and transmits it either to the internet through a designated network port or a local router. If the latter is true, the data can be sent out through a wired or wireless connection, depending on the client’s setup.
4. The data is then received by the network card on the host and unpackaged/decompressed there.
5. The data is then processed by the computer and the actions are executed.
6. Once execution is complete, the response, which is usually accompanied with display data, is sent back to the client through the same process through which it was received.
The “Epoch Proxy Laptop” is also capable of controlling peripheral devices connected to the host’s computer. Additionally, it can support peripherals on the client’s side as well. This allows the client to connect a printer, speaker, or any other device and have outputs from the host processed by said peripherals connected to the client.
Design Constraints:
Economic:
Would our product be worth it? How much would companies be willing to invest on our system? These questions form economic restraints on the system – that affects its price and ultimately what we can actually achieve with that certain price constraint. Our laptops must be under the regular prices for netbooks (300$) - and much less than actual workstations (1000$) or else the product will not be competitive. Based on the two implementations provided, the minimalistic hardware and software used will allow this requirement to be met. The proxy laptops as well as the powerful main terminal must be lower in price than if a company would buy workstations instead.
Environmental:
“Manufacturing computers is materials intensive; the total fossil fuels used to make one desktop computer weigh over 240 kilograms, some 10 times the weight of the computer itself.” The production of computers has a large impact on the environment. It is our responsibility to limit the amount of toxic materials used in the production of our product as well as inform our clients on how to properly dispose of our product. However, since the hardware requirements for the laptop are not extensive – it is more environmentally friendly than most of the usual workstations. When evaluating this product by fossil fuel usage as above, these computers are drastically lower in environmental cost. Based on typical netbook weights, the cost would be 1/10th of a desktop computer at most (quite likely to be lower) and further impacts this by reducing the need for desktop computers in general.
Health and Safety:
The use of a product such as the proxy laptop is just as safe as any other computer device. Minor things we have to consider are: brightness adjustment for eye health, ergonomic design on keyboards to relieve stress on the employee. Although unlikely, since employees would stare at the screen all day, we would also put countermeasures against visuals that can invoke epileptic shock to those prone to the condition. The only aspect which suggests that this product will impact health is the decreased screen size to improve portability. Nonetheless, the impact on health by this product should be inconsequential when compared to the impact other products are already having.
Manufacturability:
Since it is the computer age, the technology to manufacture our product is very prominent whether it be chip fabrication or molding for the casings. The design on the laptop would have to be easily assembled through an assembly line as well as use cheap and easily accessible materials. The hardware suggested for implementation is typical hardware produced in many modern factories. Since the product is similar in manufacturing to the current Netbooks, it could even be feasible to repurpose current factories towards this product with limited time to reallocate them being necessary.
Sustainability:
Technology evolves rapidly – we have to make certain that our system will meet the needs of the company not only now but also in the future. This will be done through updates and fixes. However, since our system only uses the proxy laptop as a window that views computations by a more powerful computer, it is much easier to sustain technology by updating the few main terminals than if the company had to update all of its workstations. Based on the probable cost of the product, it would be low cost for users to update the hardware by simply buying a newer model of the product as it becomes available. The other three factors (environment, health, and manufacturing) are aspects which can only improve over time as changes are made to the technology. Various health and environmental movements will ensure that this product maintains acceptable levels in these aspects.
Professional and Ethical Responsibilities
Since our system is meant to be used by other professionals – like a company – they have the responsibility to set their own professional and ethical standards in the use of our system. However, there are some major responsibilities we have to those companies and these responsibilities are: non-disclosure of confidential information and security procedures. It is the computer age, important records and information about the company is stored and accessed by computers. By switching to our system and the maintenance that comes with it, the company entrusts us with handling (even if temporarily) some of their data. With that in mind, we have the professional responsibility to keep that information confidential. The same goes for security procedures – since our system will be used by the company we have to make sure that the system is secure enough to protect that company's confidential information. The challenge for this project is to maximize the security of the system so that our clients will have the utmost confidence that their information is safe. Also, based on the hardware considered, it is likely that the production of this device would need to be outsourced. It would be simplest to have the product be adopted by a major company which already has suitable factories for production. The software options chosen are ones which do not result in copyright infringement. This is especially true with the inclusion of custom software portions designed by the project team.
As said before, our system is to be used by other professionals – thus the ethical responsibility rests on those companies. Some ethical questions that those companies would have to decide on include:
- Should the employees be able to access the internet?
- Should the employees be able to use the proxy laptop for anything other than work?
Our system would be made able to do these things – like surf the web. However it is up to our clients to make the ethical decisions of how to treat their employees who use this device.
Data Sheets
Texas Instruments WL1271-TiWi
http://www.ti.com/lit/ds/swrs100a/swrs100a.pdf
WD Sorpio Blue
http://www.wdc.com/wdproducts/library/SpecSheet/ENG/2879-701278.pdf
Intel Atom D2000 and N2000 Series
https://www-ssl.intel.com/content/www/us/en/processors/atom/atom-d2000-n2000-vol-2-datasheet.html
Intel ICH10 Data Sheet
http://www.intel.com/content/www/us/en/io/io-controller-hub-10-family-datasheet.html
HannStar Display
http://www.hannstar.com/Common.aspx?mid=163&tmid=3&modid=4