SlideShare una empresa de Scribd logo
1 de 22
A
Seminar
Presentation
On
PERVASIVE
COMPUTING
ABSTRACT
 The dissemination and use of modern
information and communication technologies
(ICT) are considered to be preconditions today
for dynamic economic growth and future
viability in global competition.
 Enormous change produced by the latest
technologies.
 Digital information and services are going
mobile.
 An emerging trend towards pervasive
computing- ubiquitous and invisible use,
creation, processing, transmission and storage of
information.
 Everyday objects are becoming “smart objects”,
which are linked together into networks, react to
their environment, and interact with their users.
 Includes the central trends in pervasive
computing, its relationship with distributed and
mobile computing, its issues and what
challenges are posed to computer systems
research by pervasive computing
What is Pervasive Computing
 “The most profound technologies are those
that disappear. They weave themselves into
the fabric of everyday life until they are
indistinguishable from it” , mentioned by
Mark Weiser in his seminal paper of 1991.
 The growing trend towards embedding
microprocessors in everyday objects so they
can communicate information.
 The word pervasive means "existing
everywhere."
 The goal is to create ambient intelligence
where network devices embedded in the
environment provide unobtrusive
connectivity and services all the time, thus
improving human experience and quality of
life without explicit awareness of the
underlying communications and computing
technologies.
 In this environment, the world around us is
interconnected as pervasive network of
intelligent devices that cooperatively and
autonomously collect, process and transport
information in order to adapt to the
associated context and activity
Characteristics
 Miniaturization: ICT components are
becoming smaller and more mobile.
 Embedding: Components are integrated
into everyday objects, they transform
them into smart objects.
 Networking: Components are linked to
each other and communicate generally via
radio.
 Ubiquity: Components are ubiquitous,
which makes them less noticeable.
 Context awareness : Components use
sensors and communication to collect
information about their users and
environment and adjust their behavior
accordingly.
Pervasive Computing is complementary to
virtual reality. It turns all objects in the
real world into part of an information and
communications system.
Distributed Computing
 With the arrival of networking, personal
computing evolved to distributed computing.
As computers became connected, they began
to share capabilities over the network.
 Seamless access to remote information
resources and communication with fault
tolerance, high availability and security.
 Many users now routinely refer to their point
of presence within the digital world—
typically, their homepages, portals, or e-mail
addresses. The computer they use to access
these “places” has become largely irrelevant.
Mobile Computing
 Mobile computing emerged from the integration
of cellular technology with the Web. Both the size
and price of mobile devices are falling everyday
and could eventually support Weiser’s vision of
pervasive inch-scale computing devices readily
available to users in any human environment.
 The “anytime anywhere” goal of mobile
computing is essentially a reactive approach to
information access, but it prepares the way for
pervasive computing proactive “all the time
everywhere” goal.
System view of Pervasive
Computing
ISSUES & CHALLENGES
 Scalability:
As environmental smartness grows so will
the number of devices connected to the
environment and the intensity of human-
machine interactions.
Traditional development requires recreating
the application for each new device.
Writing a single application logic for once,
that is independent of devices would solve
the scalability problem
 Heterogeneity:
 Conversion from one domain to another is integral
to computing and communication. Assuming that
uniform and compatible implementations of smart
environments are not achievable, pervasive
computing must find ways to mask this
heterogeneity or uneven conditioning
 Applications are typically developed for specific
device classes or system platforms, leading to
separate versions of the same application for
handhelds, desktops, and cluster-based servers. As
heterogeneity increases, developing applications
that run across all platforms will become
exceedingly difficult.
 Integration:
Though pervasive computing components
are already deployed in many
environments, integrating them into a
single platform is still a research problem.
The problem is similar to what researchers
in distributed computing face, but the
scale is bigger.
As the number of devices and applications
increases, integration becomes more
complex.
 Invisibility:
It focuses on minimal user distraction
The environment should meet user’s
expectations and rarely presents him with
surprises, allowing the user to interact at a
subconscious level
Limiting Factors
 inadequate trust and lack of acceptance on
the part of the user
 lack of personal advantages
 privacy
 security issues
 high costs
 technical obstacles (availability and
reliability)
 lack of commercial concepts/business
models
 customer unwillingness to paying for
pervasive computing services
 negative environmental impact/high
resource consumption
 lack of legal regulation
 lack of standardization
 inadequate human-machine interface
Pervasive Initiatives
 Oxygen:
an MIT initiative, envisions a future in
which computation will be freely
available everywhere, like oxygen in the
air we breathe.
The project rests on an infrastructure of
mobile and stationary devices connected
by a self configuring network.
 Aura:
“distraction free ubiquitous computing.”
The project aims to design, implement,
deploy, and evaluate a large scale
computing system demonstrating a
“personal information aura” that spans
wearable, handheld, desktop, and
infrastructure computers.
 Cooltown:
Hewlett-Packard’s pervasive computing
initiative, focuses on extending Web
technology, wireless networks, and
portable devices to create a virtual bridge
between mobile users and physical entities
and electronic services.
CONCLUSION
 Pervasive computing is about making our
lives simpler through digital environments
that are sensitive, adaptive, and responsive
to human needs.
 Pervasive computing will be a fertile
source of challenging research problems
in computer systems for many years to
come.
 Research challenges in areas outside
computer systems need to be addressed.
 These areas include human-computer
interaction , software agents and expert
systems and artificial intelligence.
 Pervasive computing will thus be the
crucible in which many disjoint areas of
research are fused.
THANK YOU

Más contenido relacionado

La actualidad más candente

La actualidad más candente (20)

Ubiquitous computing
Ubiquitous computing Ubiquitous computing
Ubiquitous computing
 
Seminar on pervasive computing
Seminar  on pervasive computingSeminar  on pervasive computing
Seminar on pervasive computing
 
Ubiquitous computing
Ubiquitous computingUbiquitous computing
Ubiquitous computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Fog computing
Fog computingFog computing
Fog computing
 
Pervasive Computing - Let us Pervade our Future
Pervasive Computing - Let us Pervade our FuturePervasive Computing - Let us Pervade our Future
Pervasive Computing - Let us Pervade our Future
 
pervasive computing
pervasive computingpervasive computing
pervasive computing
 
PERVASIVE COMPUTING
PERVASIVE COMPUTINGPERVASIVE COMPUTING
PERVASIVE COMPUTING
 
Introduction uc
Introduction ucIntroduction uc
Introduction uc
 
Mobile Computing
Mobile ComputingMobile Computing
Mobile Computing
 
Ambient intelligence
Ambient intelligenceAmbient intelligence
Ambient intelligence
 
COMPUTER CLOTHING
COMPUTER CLOTHINGCOMPUTER CLOTHING
COMPUTER CLOTHING
 
Middleware Technologies ppt
Middleware Technologies pptMiddleware Technologies ppt
Middleware Technologies ppt
 
Introduction to Cloud Data Center and Network Issues
Introduction to Cloud Data Center and Network IssuesIntroduction to Cloud Data Center and Network Issues
Introduction to Cloud Data Center and Network Issues
 
Fog Computing
Fog ComputingFog Computing
Fog Computing
 
UBIQUITOUS COMPUTING - Mary M
UBIQUITOUS COMPUTING - Mary MUBIQUITOUS COMPUTING - Mary M
UBIQUITOUS COMPUTING - Mary M
 
Ambient intelligence (AmI)
 Ambient intelligence (AmI)  Ambient intelligence (AmI)
Ambient intelligence (AmI)
 
Ambient Intelligence
Ambient IntelligenceAmbient Intelligence
Ambient Intelligence
 
Pervasive Computing: Vision and Challenges
Pervasive Computing: Vision and ChallengesPervasive Computing: Vision and Challenges
Pervasive Computing: Vision and Challenges
 
Ubiquitous Computing
Ubiquitous ComputingUbiquitous Computing
Ubiquitous Computing
 

Destacado

Introduction to Ubiquitous Computing
Introduction to Ubiquitous ComputingIntroduction to Ubiquitous Computing
Introduction to Ubiquitous ComputingHoneyson Joseph
 
Security and privacy issues of pervasive computing
Security and privacy issues of pervasive computingSecurity and privacy issues of pervasive computing
Security and privacy issues of pervasive computingRam kumar
 
Pervasive Computing : You're Already Knee Deep In It
Pervasive Computing : You're Already Knee Deep In ItPervasive Computing : You're Already Knee Deep In It
Pervasive Computing : You're Already Knee Deep In ItRob Manson
 
PervasiveComputing
PervasiveComputingPervasiveComputing
PervasiveComputingCDAC
 
Pervasive computing
Pervasive computingPervasive computing
Pervasive computingKelly Zhang
 
Conversational Architecture, CAVE Language, Data Stewardship
Conversational Architecture, CAVE Language, Data StewardshipConversational Architecture, CAVE Language, Data Stewardship
Conversational Architecture, CAVE Language, Data StewardshipLoren Davie
 
Ambient intelligence & Ubiquitous Computing
Ambient intelligence & Ubiquitous ComputingAmbient intelligence & Ubiquitous Computing
Ambient intelligence & Ubiquitous ComputingRohit Arora
 
I hear voices: Explorations of multidevice experiences with conversational as...
I hear voices: Explorations of multidevice experiences with conversational as...I hear voices: Explorations of multidevice experiences with conversational as...
I hear voices: Explorations of multidevice experiences with conversational as...Karen Kaushansky
 
Products are Services, how ubiquitous computing changes design
Products are Services, how ubiquitous computing changes designProducts are Services, how ubiquitous computing changes design
Products are Services, how ubiquitous computing changes designMike Kuniavsky
 
Seminar Report On Bitcoin
Seminar Report On BitcoinSeminar Report On Bitcoin
Seminar Report On BitcoinTouroxy
 
Ec2009 ch08 mobile commerce and pervasive computing
Ec2009 ch08 mobile commerce and pervasive computingEc2009 ch08 mobile commerce and pervasive computing
Ec2009 ch08 mobile commerce and pervasive computingNuth Otanasap
 
Understanding the New World of Cognitive Computing
Understanding the New World of Cognitive ComputingUnderstanding the New World of Cognitive Computing
Understanding the New World of Cognitive ComputingDATAVERSITY
 
Docker on IoT Devices
Docker on IoT DevicesDocker on IoT Devices
Docker on IoT DevicesDocker, Inc.
 
Cognitive Computing : Trends to Watch in 2016
Cognitive Computing:  Trends to Watch in 2016Cognitive Computing:  Trends to Watch in 2016
Cognitive Computing : Trends to Watch in 2016Bill Chamberlin
 
Distributed Systems
Distributed SystemsDistributed Systems
Distributed SystemsRupsee
 
Seminar on cloud computing by Prashant Gupta
Seminar on cloud computing by Prashant GuptaSeminar on cloud computing by Prashant Gupta
Seminar on cloud computing by Prashant GuptaPrashant Gupta
 

Destacado (17)

Introduction to Ubiquitous Computing
Introduction to Ubiquitous ComputingIntroduction to Ubiquitous Computing
Introduction to Ubiquitous Computing
 
Security and privacy issues of pervasive computing
Security and privacy issues of pervasive computingSecurity and privacy issues of pervasive computing
Security and privacy issues of pervasive computing
 
Pervasive Computing : You're Already Knee Deep In It
Pervasive Computing : You're Already Knee Deep In ItPervasive Computing : You're Already Knee Deep In It
Pervasive Computing : You're Already Knee Deep In It
 
Fog computing
Fog computingFog computing
Fog computing
 
PervasiveComputing
PervasiveComputingPervasiveComputing
PervasiveComputing
 
Pervasive computing
Pervasive computingPervasive computing
Pervasive computing
 
Conversational Architecture, CAVE Language, Data Stewardship
Conversational Architecture, CAVE Language, Data StewardshipConversational Architecture, CAVE Language, Data Stewardship
Conversational Architecture, CAVE Language, Data Stewardship
 
Ambient intelligence & Ubiquitous Computing
Ambient intelligence & Ubiquitous ComputingAmbient intelligence & Ubiquitous Computing
Ambient intelligence & Ubiquitous Computing
 
I hear voices: Explorations of multidevice experiences with conversational as...
I hear voices: Explorations of multidevice experiences with conversational as...I hear voices: Explorations of multidevice experiences with conversational as...
I hear voices: Explorations of multidevice experiences with conversational as...
 
Products are Services, how ubiquitous computing changes design
Products are Services, how ubiquitous computing changes designProducts are Services, how ubiquitous computing changes design
Products are Services, how ubiquitous computing changes design
 
Seminar Report On Bitcoin
Seminar Report On BitcoinSeminar Report On Bitcoin
Seminar Report On Bitcoin
 
Ec2009 ch08 mobile commerce and pervasive computing
Ec2009 ch08 mobile commerce and pervasive computingEc2009 ch08 mobile commerce and pervasive computing
Ec2009 ch08 mobile commerce and pervasive computing
 
Understanding the New World of Cognitive Computing
Understanding the New World of Cognitive ComputingUnderstanding the New World of Cognitive Computing
Understanding the New World of Cognitive Computing
 
Docker on IoT Devices
Docker on IoT DevicesDocker on IoT Devices
Docker on IoT Devices
 
Cognitive Computing : Trends to Watch in 2016
Cognitive Computing:  Trends to Watch in 2016Cognitive Computing:  Trends to Watch in 2016
Cognitive Computing : Trends to Watch in 2016
 
Distributed Systems
Distributed SystemsDistributed Systems
Distributed Systems
 
Seminar on cloud computing by Prashant Gupta
Seminar on cloud computing by Prashant GuptaSeminar on cloud computing by Prashant Gupta
Seminar on cloud computing by Prashant Gupta
 

Similar a Pervasive Computing

Quality Metrics In Ubiquitous Computing
Quality Metrics In Ubiquitous ComputingQuality Metrics In Ubiquitous Computing
Quality Metrics In Ubiquitous ComputingRutvik Pensionwar
 
Towards Pervasive Computing Environments With Cloud Services
Towards Pervasive Computing Environments With Cloud ServicesTowards Pervasive Computing Environments With Cloud Services
Towards Pervasive Computing Environments With Cloud Servicesijsptm
 
Pervasive computing
Pervasive computingPervasive computing
Pervasive computingPallav Kumar
 
Ubiquitous computing
Ubiquitous computingUbiquitous computing
Ubiquitous computingValeria Gasik
 
Ubiqutous Computing
Ubiqutous ComputingUbiqutous Computing
Ubiqutous Computingdeaneal
 
Ambient Intelligence Ambient Intelligence
Ambient Intelligence Ambient IntelligenceAmbient Intelligence Ambient Intelligence
Ambient Intelligence Ambient IntelligenceBRNSSPublicationHubI
 
Ubiquitous computing Paper
 Ubiquitous computing Paper Ubiquitous computing Paper
Ubiquitous computing PaperAssem mousa
 
IoT: Ongoing challenges and opportunities in Mobile Technology
IoT: Ongoing challenges and opportunities in Mobile TechnologyIoT: Ongoing challenges and opportunities in Mobile Technology
IoT: Ongoing challenges and opportunities in Mobile TechnologyAI Publications
 
Harbor Research - Designing Security for the Internet of Things & Smart Devices
Harbor Research - Designing Security for the Internet of Things & Smart DevicesHarbor Research - Designing Security for the Internet of Things & Smart Devices
Harbor Research - Designing Security for the Internet of Things & Smart DevicesHarbor Research
 
Ubiquitous computing-and-its-privacy
Ubiquitous computing-and-its-privacyUbiquitous computing-and-its-privacy
Ubiquitous computing-and-its-privacyHatum Hussain
 
Ubiquitous computing-and-its-privacy
Ubiquitous computing-and-its-privacyUbiquitous computing-and-its-privacy
Ubiquitous computing-and-its-privacyHatum Hussain
 
Telecom trends 261112
Telecom trends 261112Telecom trends 261112
Telecom trends 261112Sharon Rozov
 
Security Attacks And Solutions On Ubiquitous Computing Networks
Security Attacks And Solutions On Ubiquitous Computing NetworksSecurity Attacks And Solutions On Ubiquitous Computing Networks
Security Attacks And Solutions On Ubiquitous Computing NetworksAhmad Sharifi
 
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...Editor IJCATR
 
A Posteriori Perusal of Mobile Computing
A Posteriori Perusal of Mobile ComputingA Posteriori Perusal of Mobile Computing
A Posteriori Perusal of Mobile ComputingEditor IJCATR
 
A Posteriori Perusal of Mobile Computing
A Posteriori Perusal of Mobile ComputingA Posteriori Perusal of Mobile Computing
A Posteriori Perusal of Mobile ComputingEditor IJCATR
 

Similar a Pervasive Computing (20)

Quality Metrics In Ubiquitous Computing
Quality Metrics In Ubiquitous ComputingQuality Metrics In Ubiquitous Computing
Quality Metrics In Ubiquitous Computing
 
Chap 1 libre
Chap 1 libreChap 1 libre
Chap 1 libre
 
Towards Pervasive Computing Environments With Cloud Services
Towards Pervasive Computing Environments With Cloud ServicesTowards Pervasive Computing Environments With Cloud Services
Towards Pervasive Computing Environments With Cloud Services
 
UBIQUITOUS COMPUTING
UBIQUITOUS COMPUTINGUBIQUITOUS COMPUTING
UBIQUITOUS COMPUTING
 
Pervasive Computing
Pervasive ComputingPervasive Computing
Pervasive Computing
 
Pervasive computing
Pervasive computingPervasive computing
Pervasive computing
 
Ubiquitous computing
Ubiquitous computingUbiquitous computing
Ubiquitous computing
 
Ubiqutous Computing
Ubiqutous ComputingUbiqutous Computing
Ubiqutous Computing
 
Ambient Intelligence Ambient Intelligence
Ambient Intelligence Ambient IntelligenceAmbient Intelligence Ambient Intelligence
Ambient Intelligence Ambient Intelligence
 
Ubiquitous computing Paper
 Ubiquitous computing Paper Ubiquitous computing Paper
Ubiquitous computing Paper
 
IoT: Ongoing challenges and opportunities in Mobile Technology
IoT: Ongoing challenges and opportunities in Mobile TechnologyIoT: Ongoing challenges and opportunities in Mobile Technology
IoT: Ongoing challenges and opportunities in Mobile Technology
 
Harbor Research - Designing Security for the Internet of Things & Smart Devices
Harbor Research - Designing Security for the Internet of Things & Smart DevicesHarbor Research - Designing Security for the Internet of Things & Smart Devices
Harbor Research - Designing Security for the Internet of Things & Smart Devices
 
Ubiquitous computing-and-its-privacy
Ubiquitous computing-and-its-privacyUbiquitous computing-and-its-privacy
Ubiquitous computing-and-its-privacy
 
Ubiquitous computing-and-its-privacy
Ubiquitous computing-and-its-privacyUbiquitous computing-and-its-privacy
Ubiquitous computing-and-its-privacy
 
IOTCYBER
IOTCYBERIOTCYBER
IOTCYBER
 
Telecom trends 261112
Telecom trends 261112Telecom trends 261112
Telecom trends 261112
 
Security Attacks And Solutions On Ubiquitous Computing Networks
Security Attacks And Solutions On Ubiquitous Computing NetworksSecurity Attacks And Solutions On Ubiquitous Computing Networks
Security Attacks And Solutions On Ubiquitous Computing Networks
 
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...
 
A Posteriori Perusal of Mobile Computing
A Posteriori Perusal of Mobile ComputingA Posteriori Perusal of Mobile Computing
A Posteriori Perusal of Mobile Computing
 
A Posteriori Perusal of Mobile Computing
A Posteriori Perusal of Mobile ComputingA Posteriori Perusal of Mobile Computing
A Posteriori Perusal of Mobile Computing
 

Último

AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdfankushspencer015
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduitsrknatarajan
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
Glass Ceramics: Processing and Properties
Glass Ceramics: Processing and PropertiesGlass Ceramics: Processing and Properties
Glass Ceramics: Processing and PropertiesPrabhanshu Chaturvedi
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Christo Ananth
 
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTINGMANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTINGSIVASHANKAR N
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...Call Girls in Nagpur High Profile
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdfKamal Acharya
 
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsRussian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 

Último (20)

AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
Glass Ceramics: Processing and Properties
Glass Ceramics: Processing and PropertiesGlass Ceramics: Processing and Properties
Glass Ceramics: Processing and Properties
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTINGMANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdf
 
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsRussian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 

Pervasive Computing

  • 2. ABSTRACT  The dissemination and use of modern information and communication technologies (ICT) are considered to be preconditions today for dynamic economic growth and future viability in global competition.  Enormous change produced by the latest technologies.  Digital information and services are going mobile.
  • 3.  An emerging trend towards pervasive computing- ubiquitous and invisible use, creation, processing, transmission and storage of information.  Everyday objects are becoming “smart objects”, which are linked together into networks, react to their environment, and interact with their users.  Includes the central trends in pervasive computing, its relationship with distributed and mobile computing, its issues and what challenges are posed to computer systems research by pervasive computing
  • 4. What is Pervasive Computing  “The most profound technologies are those that disappear. They weave themselves into the fabric of everyday life until they are indistinguishable from it” , mentioned by Mark Weiser in his seminal paper of 1991.  The growing trend towards embedding microprocessors in everyday objects so they can communicate information.  The word pervasive means "existing everywhere."
  • 5.  The goal is to create ambient intelligence where network devices embedded in the environment provide unobtrusive connectivity and services all the time, thus improving human experience and quality of life without explicit awareness of the underlying communications and computing technologies.  In this environment, the world around us is interconnected as pervasive network of intelligent devices that cooperatively and autonomously collect, process and transport information in order to adapt to the associated context and activity
  • 6. Characteristics  Miniaturization: ICT components are becoming smaller and more mobile.  Embedding: Components are integrated into everyday objects, they transform them into smart objects.  Networking: Components are linked to each other and communicate generally via radio.
  • 7.  Ubiquity: Components are ubiquitous, which makes them less noticeable.  Context awareness : Components use sensors and communication to collect information about their users and environment and adjust their behavior accordingly. Pervasive Computing is complementary to virtual reality. It turns all objects in the real world into part of an information and communications system.
  • 8. Distributed Computing  With the arrival of networking, personal computing evolved to distributed computing. As computers became connected, they began to share capabilities over the network.  Seamless access to remote information resources and communication with fault tolerance, high availability and security.  Many users now routinely refer to their point of presence within the digital world— typically, their homepages, portals, or e-mail addresses. The computer they use to access these “places” has become largely irrelevant.
  • 9. Mobile Computing  Mobile computing emerged from the integration of cellular technology with the Web. Both the size and price of mobile devices are falling everyday and could eventually support Weiser’s vision of pervasive inch-scale computing devices readily available to users in any human environment.  The “anytime anywhere” goal of mobile computing is essentially a reactive approach to information access, but it prepares the way for pervasive computing proactive “all the time everywhere” goal.
  • 10. System view of Pervasive Computing
  • 11. ISSUES & CHALLENGES  Scalability: As environmental smartness grows so will the number of devices connected to the environment and the intensity of human- machine interactions. Traditional development requires recreating the application for each new device. Writing a single application logic for once, that is independent of devices would solve the scalability problem
  • 12.  Heterogeneity:  Conversion from one domain to another is integral to computing and communication. Assuming that uniform and compatible implementations of smart environments are not achievable, pervasive computing must find ways to mask this heterogeneity or uneven conditioning  Applications are typically developed for specific device classes or system platforms, leading to separate versions of the same application for handhelds, desktops, and cluster-based servers. As heterogeneity increases, developing applications that run across all platforms will become exceedingly difficult.
  • 13.  Integration: Though pervasive computing components are already deployed in many environments, integrating them into a single platform is still a research problem. The problem is similar to what researchers in distributed computing face, but the scale is bigger. As the number of devices and applications increases, integration becomes more complex.
  • 14.  Invisibility: It focuses on minimal user distraction The environment should meet user’s expectations and rarely presents him with surprises, allowing the user to interact at a subconscious level
  • 15. Limiting Factors  inadequate trust and lack of acceptance on the part of the user  lack of personal advantages  privacy  security issues  high costs  technical obstacles (availability and reliability)
  • 16.  lack of commercial concepts/business models  customer unwillingness to paying for pervasive computing services  negative environmental impact/high resource consumption  lack of legal regulation  lack of standardization  inadequate human-machine interface
  • 17. Pervasive Initiatives  Oxygen: an MIT initiative, envisions a future in which computation will be freely available everywhere, like oxygen in the air we breathe. The project rests on an infrastructure of mobile and stationary devices connected by a self configuring network.
  • 18.  Aura: “distraction free ubiquitous computing.” The project aims to design, implement, deploy, and evaluate a large scale computing system demonstrating a “personal information aura” that spans wearable, handheld, desktop, and infrastructure computers.
  • 19.  Cooltown: Hewlett-Packard’s pervasive computing initiative, focuses on extending Web technology, wireless networks, and portable devices to create a virtual bridge between mobile users and physical entities and electronic services.
  • 20. CONCLUSION  Pervasive computing is about making our lives simpler through digital environments that are sensitive, adaptive, and responsive to human needs.  Pervasive computing will be a fertile source of challenging research problems in computer systems for many years to come.  Research challenges in areas outside computer systems need to be addressed.
  • 21.  These areas include human-computer interaction , software agents and expert systems and artificial intelligence.  Pervasive computing will thus be the crucible in which many disjoint areas of research are fused.