Pervasive Computing
Upcoming SlideShare
Loading in...5

Pervasive Computing



presented by Nesha Rani M

presented by Nesha Rani M



Total Views
Views on SlideShare
Embed Views



2 Embeds 11 8 3



Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.


11 of 1

  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
Post Comment
Edit your comment

    Pervasive Computing Pervasive Computing Presentation Transcript

    • Pervasive computing
    • A dvances in technology allow us to embed computing power into smaller and smaller devices. Ubiquitous computing explores the new possibilities afforded by the fusion of computers with everyday objects . T his talk will take a brief look at the foundations of pervasive computing, and lots more…. Computers E verywhere Pervasive Computing
    • What is Pervasive Computing?
      • Technology View
      • Computers everywhere – embedded into fridges, washing machines, door locks, cars, furniture, people.
      • intelligent environment
      • Mobile portable computing devices
      • Wireless communication – seamless mobile/fixed
      • User View
      • Invisible – implicit interaction with your environment
      • Augmenting human abilities in context of tasks
      • Ubiquitous = mobile computing + intelligent
      • environment
    • Definitions
      • Post-desktop model of human-computer interaction in which information processing has been thoroughly integrated into everyday objects and activities.
      • Ubiquitous computing, or calm technology, is a
      • paradigm shift where technology becomes virtually
      • invisible in our lives.
      • All models of ubiquitous computing share a vision of small, inexpensive, robust networked processing devices, distributed at all scales throughout everyday life.
    • Bill Gates home
    • Fictional Technologies in SPY KIDS
    • Intelligent Environment
      • Lights, air conditioning, TV automatically switch on and
      • off when you enter or leave rooms.
      • Sit on your favourite chair and TV switches on to the
      • program you usually watch at this time of the day.
      • Use communicator/pda for phone, remote control, keys
      • payments, passport, health records, authenticator.
      • Route input from ‘virtual’ keyboard to nearest suitable
      • display.
      • Automatic detection of new items to control and physical
      • layout in a room or office, using computer vision.
    • Mobile Computing Vision
      • Universal connectivity – anywhere, anytime
      • Accommodate heterogeneity of networks and communicators
      • Ubiquitous intelligent environment – embedded computers everywhere
      • Easy user interaction
      • Context independent access to services + context dependent information
      • Imagine Having a SINGLE remote to control all your Electronic Gadgets.
    • Essential Technologies for Pervasive Computing
      • Hardware technologies
        • microcontrollers …
        • (Wireless) networking
        • Sensors, actuators
        • Power
        • Potentially: entirely new technologies (optoelectronics)
      • Software technologies
        • Operating environments
        • Networking
        • Middleware
        • Platform technologies
        • User interfaces
    • Sentilla Software
      • Sentilla Point - Java-Powered software platform
      • C ontains - operating system, virtual machine and system libraries .
      • Sentilla Work, - Eclipse-based IDE  creating simple and easy programs.
      • Sentilla Server, PC-class software that enables the pervasive computers in the network to connect to your enterprise infrastructure
    • Sentilla
    • Sentilla Hardware
      • Sentilla Mini  core of pervasive computing solution .
      • Combining MSP430 microcontroller with a TI/Chipcon CC2420 low-power wireless radio .
      • Design  flexibl e and scalabl e.
      • Mini pre-bundled with Sentilla Point ( the world’s only Java-compliant software platform for pervasive computers .)
    • Genre of product solutions
      • Energy management.
      • Safety and security.
      • Logistics and asset management.
    • Sentilla Labs
      • Bite-sized versions of large-scale industry applications. Project  refrigerator monitor.
      • Developer applications and prototype hardware.
      • Project  Motion Detector
      • Uses a Radio Shack infrared detector to alert you when there's movement.
      • Fun applications.
      • Project  classic, Pong.
    • Challenge: Social Issues
      • Control: who watches the watchers, what is being recorded, who has access and when
      • Security of information
      • Privacy concerns
      • Transparency of computer actions (or lack thereof)
      • Legal implications of enabling technology
    • Make computers security “conscious”, minimise user intervention
      • Establish strong identity
        • Goal: Cryptographically strong identity to devices (endpoints)
        • Means: Host Identity Protocol (HIP)
      • Assign and manage trust and authority
        • Goal: Decentralised means for managing authorisation
        • Means: SPKI certificates
    • Public keys
    • Trust in pervasive computing environments
    • Yesterday's Computers Filled Rooms …
    • … So Will Tomorrow’s
    • References