pervasivecomputing 140422034057-phpapp02
TRANSCRIPT
PERVASIVE COMPUTING
By
A.Pravallika
11711A01203
Department of IT
Contents: What is Pervasive Computing Definition Why Pervasive Computing History Pervasive computing Components Pervasive Computing Networking Applications Advantages Disadvantages Conclusion
What is Pervasive Computing?
Pervasive means “EXISTING EVERYWHERE”
Pervasive computing incorporate the future of network computing
enabling wireless communication between individuals and computing
devices and between devices itself.
Pervasive Computing devices are tiny, invisible microprocessors
embedded in any type of objects like clothes,home,cars,watches etc.,
Also known as Ubiquitous Computing.
Definition: In Technology View Computers everywhere – embedded into fridges, washing
machines, door locks, cars, furniture, people. intelligent environment – Lights, air conditioning, TV
automatically switch on and off when you enter or leave rooms.
Mobile Computing Vision –Universal connectivity to anywhere, anytime.
In User View Invisible – implicit interaction with your environment Augmenting human abilities in context of tasks Ubiquitous = mobile computing + intelligent
environment
Why Pervasive Computing?
Pervasive computing is the growing trend towards embedding
microprocessors in everyday objects so they can communicate
information.
pervasive computing is the concept related to the ability to
perform computing tasks on any type of devices.
this technology is moving beyond the personal computer to
everyday devices with embedded technology .
History:In the 21st century the technology revolution will move into the everyday, the small and the invisible
“The most profound technologies are those that disappears. ”
Mark Weiser (1952 –1999),XEROX PARC(Palo Alto Research Center)
Pervasive computing is the third wave of computing technologies to emerge since computers first appeared:
First Wave - Mainframe computing era: one computer shared by many people, via workstations.
Second Wave - Personal computing era: one computer used by one person, requiring a conscious interaction. Users largely bound to desktop.
Third Wave – Pervasive computing era: one person, many computers. Millions of computers embedded in the environment, allowing technology to recede into the background.
Pervasive Computing Components
Pervasive computing involves three converging areas of Information and Communications Technology(CIT):
Computing (‘smart devices’), Communications (‘connectivity’) User interfaces
Smart Devices can communicate with each other
sensors: input devices that detect environmental changes, user behaviors, human commands etc;processors: electronic systems that analyze input-data;actuators: output devices that respond to processed information by altering the environment via electronic or mechanical means.
For example, air temperature control is often done with actuators. However the term can also refer to devices which deliver information rather than altering the environment physically.
Connectivity (network)• Many existing and emerging wireless technologies serve in
Pervasive Computing:
Zigbee and Bluetooth :sensors and actuators - low energy consumption, short distances (up to 10 meters)
Wi-Fi - devices : middle ranges (several hundreds of meters) 3G /4G : A home gateway to Internet - long ranges (several to
tens of kilometres)
User Interfaces point of contact between ICT and human
Active: Users control PC technologies and devices Passive: PC control in the background
For example recognizing a person’s face. It might also be based on sound, touch recognition, or other sensory information like temperature.
PERVASIVE NETWORKING Pervasive networking is the ability for devices to
autonomously arrange themselves into local networks and
exchange information through these networks.
Components of Pervasive networking: Pervasive
Network Layer
Pervasive Access Layer
Pervasive Device Layer
Pervasive Human Machine Interaction Layer
Pervasive Human Core Layer
Layers of Pervasive Networking
Pervasive Network Layer
This layer includes all networks and the networks are connected
directly or indirectly to the internet. Server and Gateways are the
important parts in this layer.
Pervasive Access Layer
This layer deals with pervasive network connection issues. Issues
considered in this layer are Service Discovery and Management,
network access protocols.
Layers of Pervasive Networking
Pervasive Device Layer
This layer includes all user interactive devices whether
they are interacted directly or indirectly. Issues considered in this
layer are Sensors and Smart Devices.
Pervasive HMI Layer
This layer deals Human interaction with all network
accessed devices.
Layers of Pervasive Networking
Pervasive Human Core Layer
This layer is the inner layer of the Pervasive
networking. Issues in this layer are based on the various
applications. Applications considered for human core layer
are such as Health care, smart home, business application
etc.,
Applications Of Pervasive Computing
Healthcare Intelligent bandages that can tell how the injury is doing
or video consultations with doctors, that can treat patients at home.
Home care Transport Environmental Monitoring Industry & Academia
Example: A visitor brings his/her laptop into a meeting room and without
manually configuring it in any way uses it to send his presentation to the room’s projector Physical integration: the projector can be activated from any
laptop in the room Instantant interoperation: A laptop can spontaneously
interact with the projector and control the presentation Can be made context-sensitive, e.g., allowing only a particular
visitor to do so
ADVANTAGES OF PERVASIVE COMPUTING
Manage information quickly, efficiently and
effortlessly.
Convenient access to relevant information stored on
networks, allowing them to easily take action anywhere,
anytime.
Environment will be supplemented with interconnected
digital technologies.
DISADVANTAGES OF PERVASIVE COMPUTING
Pervasive Computing is not entirely secure.
Frequent line connections that are broken.
Slow Connections.
Very expensive operating costs.
CONCLUSION
Information can be accessed when and where it is needed.
Imagine Having a SINGLE remote to control all your
Electronic Gadgets.
But still Privacy and Security major drawbacks of the
Pervasive Computing.