Pervasive Computing

  • 5,059 views
Uploaded on

presented by Nesha Rani M

presented by Nesha Rani M

More in: Technology
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
No Downloads

Views

Total Views
5,059
On Slideshare
0
From Embeds
0
Number of Embeds
0

Actions

Shares
Downloads
323
Comments
1
Likes
4

Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide

Transcript

  • 1. Pervasive computing
  • 2. A dvances in technology allow us to embed computing power into smaller and smaller devices. Ubiquitous computing explores the new possibilities afforded by the fusion of computers with everyday objects . T his talk will take a brief look at the foundations of pervasive computing, and lots more…. Computers E verywhere Pervasive Computing
  • 3. What is Pervasive Computing?
    • Technology View
    • Computers everywhere – embedded into fridges, washing machines, door locks, cars, furniture, people.
    • intelligent environment
    • Mobile portable computing devices
    • Wireless communication – seamless mobile/fixed
    • User View
    • Invisible – implicit interaction with your environment
    • Augmenting human abilities in context of tasks
    • Ubiquitous = mobile computing + intelligent
    • environment
  • 4. Definitions
    • Post-desktop model of human-computer interaction in which information processing has been thoroughly integrated into everyday objects and activities.
    • Ubiquitous computing, or calm technology, is a
    • paradigm shift where technology becomes virtually
    • invisible in our lives.
    • All models of ubiquitous computing share a vision of small, inexpensive, robust networked processing devices, distributed at all scales throughout everyday life.
  • 5. Bill Gates home
  • 6. Fictional Technologies in SPY KIDS
  • 7. Intelligent Environment
    • Lights, air conditioning, TV automatically switch on and
    • off when you enter or leave rooms.
    • Sit on your favourite chair and TV switches on to the
    • program you usually watch at this time of the day.
    • Use communicator/pda for phone, remote control, keys
    • payments, passport, health records, authenticator.
    • Route input from ‘virtual’ keyboard to nearest suitable
    • display.
    • Automatic detection of new items to control and physical
    • layout in a room or office, using computer vision.
  • 8. Mobile Computing Vision
    • Universal connectivity – anywhere, anytime
    • Accommodate heterogeneity of networks and communicators
    • Ubiquitous intelligent environment – embedded computers everywhere
    • Easy user interaction
    • Context independent access to services + context dependent information
    • Imagine Having a SINGLE remote to control all your Electronic Gadgets.
  • 9. Essential Technologies for Pervasive Computing
    • Hardware technologies
      • microcontrollers …
      • (Wireless) networking
      • Sensors, actuators
      • Power
      • Potentially: entirely new technologies (optoelectronics)
    • Software technologies
      • Operating environments
      • Networking
      • Middleware
      • Platform technologies
      • User interfaces
  • 10. Sentilla Software
    • Sentilla Point - Java-Powered software platform
    • C ontains - operating system, virtual machine and system libraries .
    • Sentilla Work, - Eclipse-based IDE  creating simple and easy programs.
    • Sentilla Server, PC-class software that enables the pervasive computers in the network to connect to your enterprise infrastructure
  • 11. Sentilla
  • 12. Sentilla Hardware
    • Sentilla Mini  core of pervasive computing solution .
    • Combining MSP430 microcontroller with a TI/Chipcon CC2420 low-power wireless radio .
    • Design  flexibl e and scalabl e.
    • Mini pre-bundled with Sentilla Point ( the world’s only Java-compliant software platform for pervasive computers .)
  • 13. Genre of product solutions
    • Energy management.
    • Safety and security.
    • Logistics and asset management.
  • 14. Sentilla Labs
    • Bite-sized versions of large-scale industry applications. Project  refrigerator monitor.
    • Developer applications and prototype hardware.
    • Project  Motion Detector
    • Uses a Radio Shack infrared detector to alert you when there's movement.
    • Fun applications.
    • Project  classic, Pong.
  • 15. Challenge: Social Issues
    • Control: who watches the watchers, what is being recorded, who has access and when
    • Security of information
    • Privacy concerns
    • Transparency of computer actions (or lack thereof)
    • Legal implications of enabling technology
  • 16. Make computers security “conscious”, minimise user intervention
    • Establish strong identity
      • Goal: Cryptographically strong identity to devices (endpoints)
      • Means: Host Identity Protocol (HIP)
    • Assign and manage trust and authority
      • Goal: Decentralised means for managing authorisation
      • Means: SPKI certificates
  • 17. Public keys
  • 18. Trust in pervasive computing environments
  • 19. Yesterday's Computers Filled Rooms …
  • 20. … So Will Tomorrow’s
  • 21. References
    • http://researchweb.watson.ibm.com/journal/sj/384/ark.html
    • http://www.sentilla.com/
    • http://www.percom.org/
    • http://www.youtube.com/watch?v=KsKne-fw-X0
    • http://www.computer.org/portal/site/ieeecs/