Your SlideShare is downloading. ×
0
Pervasive Computing
Pervasive Computing
Pervasive Computing
Pervasive Computing
Pervasive Computing
Pervasive Computing
Pervasive Computing
Pervasive Computing
Pervasive Computing
Pervasive Computing
Pervasive Computing
Pervasive Computing
Pervasive Computing
Pervasive Computing
Pervasive Computing
Pervasive Computing
Pervasive Computing
Pervasive Computing
Pervasive Computing
Pervasive Computing
Pervasive Computing
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Pervasive Computing

5,775

Published on

presented by Nesha Rani M

presented by Nesha Rani M

Published in: Technology
1 Comment
4 Likes
Statistics
Notes
No Downloads
Views
Total Views
5,775
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
421
Comments
1
Likes
4
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. Pervasive computing
  • 2. A dvances in technology allow us to embed computing power into smaller and smaller devices. Ubiquitous computing explores the new possibilities afforded by the fusion of computers with everyday objects . T his talk will take a brief look at the foundations of pervasive computing, and lots more…. Computers E verywhere Pervasive Computing
  • 3. What is Pervasive Computing? <ul><li>Technology View </li></ul><ul><li>Computers everywhere – embedded into fridges, washing machines, door locks, cars, furniture, people. </li></ul><ul><li>intelligent environment </li></ul><ul><li>Mobile portable computing devices </li></ul><ul><li>Wireless communication – seamless mobile/fixed </li></ul><ul><li>User View </li></ul><ul><li>Invisible – implicit interaction with your environment </li></ul><ul><li>Augmenting human abilities in context of tasks </li></ul><ul><li>Ubiquitous = mobile computing + intelligent </li></ul><ul><li>environment </li></ul>
  • 4. Definitions <ul><li>Post-desktop model of human-computer interaction in which information processing has been thoroughly integrated into everyday objects and activities. </li></ul><ul><li>Ubiquitous computing, or calm technology, is a </li></ul><ul><li>paradigm shift where technology becomes virtually </li></ul><ul><li>invisible in our lives. </li></ul><ul><li>All models of ubiquitous computing share a vision of small, inexpensive, robust networked processing devices, distributed at all scales throughout everyday life. </li></ul>
  • 5. Bill Gates home
  • 6. Fictional Technologies in SPY KIDS
  • 7. Intelligent Environment <ul><li>Lights, air conditioning, TV automatically switch on and </li></ul><ul><li>off when you enter or leave rooms. </li></ul><ul><li>Sit on your favourite chair and TV switches on to the </li></ul><ul><li>program you usually watch at this time of the day. </li></ul><ul><li>Use communicator/pda for phone, remote control, keys </li></ul><ul><li>payments, passport, health records, authenticator. </li></ul><ul><li>Route input from ‘virtual’ keyboard to nearest suitable </li></ul><ul><li>display. </li></ul><ul><li>Automatic detection of new items to control and physical </li></ul><ul><li>layout in a room or office, using computer vision. </li></ul>
  • 8. Mobile Computing Vision <ul><li>Universal connectivity – anywhere, anytime </li></ul><ul><li>Accommodate heterogeneity of networks and communicators </li></ul><ul><li>Ubiquitous intelligent environment – embedded computers everywhere </li></ul><ul><li>Easy user interaction </li></ul><ul><li>Context independent access to services + context dependent information </li></ul><ul><li>Imagine Having a SINGLE remote to control all your Electronic Gadgets. </li></ul>
  • 9. Essential Technologies for Pervasive Computing <ul><li>Hardware technologies </li></ul><ul><ul><li>microcontrollers … </li></ul></ul><ul><ul><li>(Wireless) networking </li></ul></ul><ul><ul><li>Sensors, actuators </li></ul></ul><ul><ul><li>Power </li></ul></ul><ul><ul><li>Potentially: entirely new technologies (optoelectronics) </li></ul></ul><ul><li>Software technologies </li></ul><ul><ul><li>Operating environments </li></ul></ul><ul><ul><li>Networking </li></ul></ul><ul><ul><li>Middleware </li></ul></ul><ul><ul><li>Platform technologies </li></ul></ul><ul><ul><li>User interfaces </li></ul></ul>
  • 10. Sentilla Software <ul><li>Sentilla Point - Java-Powered software platform </li></ul><ul><li>C ontains - operating system, virtual machine and system libraries . </li></ul><ul><li>Sentilla Work, - Eclipse-based IDE  creating simple and easy programs. </li></ul><ul><li>Sentilla Server, PC-class software that enables the pervasive computers in the network to connect to your enterprise infrastructure </li></ul>
  • 11. Sentilla
  • 12. Sentilla Hardware <ul><li>Sentilla Mini  core of pervasive computing solution . </li></ul><ul><li>Combining MSP430 microcontroller with a TI/Chipcon CC2420 low-power wireless radio . </li></ul><ul><li>Design  flexibl e and scalabl e. </li></ul><ul><li>Mini pre-bundled with Sentilla Point ( the world’s only Java-compliant software platform for pervasive computers .) </li></ul>
  • 13. Genre of product solutions <ul><li>Energy management. </li></ul><ul><li>Safety and security. </li></ul><ul><li>Logistics and asset management. </li></ul>
  • 14. Sentilla Labs <ul><li>Bite-sized versions of large-scale industry applications. Project  refrigerator monitor. </li></ul><ul><li>Developer applications and prototype hardware. </li></ul><ul><li>Project  Motion Detector </li></ul><ul><li>Uses a Radio Shack infrared detector to alert you when there's movement. </li></ul><ul><li>Fun applications. </li></ul><ul><li>Project  classic, Pong. </li></ul>
  • 15. Challenge: Social Issues <ul><li>Control: who watches the watchers, what is being recorded, who has access and when </li></ul><ul><li>Security of information </li></ul><ul><li>Privacy concerns </li></ul><ul><li>Transparency of computer actions (or lack thereof) </li></ul><ul><li>Legal implications of enabling technology </li></ul>
  • 16. Make computers security “conscious”, minimise user intervention <ul><li>Establish strong identity </li></ul><ul><ul><li>Goal: Cryptographically strong identity to devices (endpoints) </li></ul></ul><ul><ul><li>Means: Host Identity Protocol (HIP) </li></ul></ul><ul><li>Assign and manage trust and authority </li></ul><ul><ul><li>Goal: Decentralised means for managing authorisation </li></ul></ul><ul><ul><li>Means: SPKI certificates </li></ul></ul>
  • 17. Public keys
  • 18. Trust in pervasive computing environments
  • 19. Yesterday's Computers Filled Rooms …
  • 20. … So Will Tomorrow’s
  • 21. References <ul><li>http://researchweb.watson.ibm.com/journal/sj/384/ark.html </li></ul><ul><li>http://www.sentilla.com/ </li></ul><ul><li>http://www.percom.org/ </li></ul><ul><li>http://www.youtube.com/watch?v=KsKne-fw-X0 </li></ul><ul><li>http://www.computer.org/portal/site/ieeecs/ </li></ul>

×