SlideShare a Scribd company logo
1 of 20
SWEETY SINGH
CSE Department SeacoEngineerinollge
Pervasive Computing
By
Sweety Singh
Computer Science Engineering Department
SEACOM ENGINEERING COLLEGE
WEST BENGAL - 711302
Synopsis
 Introduction
 Architecture of pervasive computing
 Principles of pervasive computing
 Major trends in computing
 Difference between ubiquitous computing and pervasive computing
 Related fields
 Uses of pervasive computing
 Benefits of pervasive computing
 Limitations of pervasive computing
 Future aspects
 Conclusion
INTRODUCTION
☻ Pervasive computing (also called ubiquitous computing ) is the growing trend
towards embedding microprocessors.
☻ The words pervasive and ubiquitous mean “ existing everywhere ".
☻ The aim of Pervasive Computing is for computing available wherever it's
needed. It spreads intelligence and connectivity to more or less everything.
☻ Ships, Aircrafts, Cars, Bridges, Tunnels, Machines, Refrigerators, Door handles,
Lighting fixtures, Shoes, Hats, Tools, Homes and even things like our coffee mugs
and even the human body embedded with chips
☻ Mobile Internet access, Third-generation wireless communication, Handheld
devices, and Bluetooth have made pervasive computing a reality.
PERVASIVE COMPUTING
 Pervasive computing means.,
1. Anytime/anywhere: 7 days x 24 hours, global, ubiquitous access.
2. Any device: PC, Palm/PDA, cell phone, and so forth.
3. Any network: Access, Notification, Data Synchronization, Queued
transactions, Wireless optimization, Security, content
adaptation/reformat, development tools, device and user management.
4. Any data: E-mail, Personal Information Manager (PIM); Inter-Intranet;
Public Services.
Continued
 Other terms for pervasive
computing:
 Ubiquitous computing
 Calm technology
 Things that think
 Everywhere
 Pervasive internet
 Ambient intelligence
 Proactive computing
 Augmented reality
 Characteristics of
pervasive computing:
 Physical integration: integration
between computing nodes and the
physical world, e.g., a whiteboard
that records what’s on.
 Instantaneous Interoperation:
devices interoperate spontaneously
in changing environments, e.g., a
device changes its partners as it
moves or as the context changes.
Architecture
 An important aspect of
the difference between
pervasive computing
and desktop
computing.
PRINCIPLES OF PERVASIVE
COMPUTING
Differences between Ubiquitous
and Pervasive Computing
Ubiquitous computing
 Ubiquitous means
everywhere
 Ubiquitous computing is
more user & application
driven
 involves use computers at
all.
Pervasive computing
 Pervasive means "diffused
throughout every part of“
 Pervasive computing is more
technology driven
 involves devices like
handhelds devices, notebook,
palmtop etc.
RELATED FIELDS
USES OF PERVASIVE COMPUTING
Applications of pervasive
computing
Smart clothing
Flex poster
Continued
Augmented Reality
Pill cam
ONGOING RESEARCH
PROJECTS
IBM ‘s “smarter planet “
The project is about building
a smarter planet by including
everyday case scenarios like
parking the car in a place by
communicating with another
car.
Benefits of pervasive
computing
 Manage information quickly, efficiently & effortlessly
 Removes complexity of new technologies
 Convenient access to relevant information stored on networks
 Easily allow user to take actions anywhere, anytime
 provide supplemented environment with interconnected digital
technologies
Limitations of pervasive
computing
 Pervasive computing is Not entirely secure
 Frequent line connections that are broken
 Slow connections
 Very expensive operating costs
FUTURE ASPECTS
 Cell phones will ask the
landline phone what its
telephone number is and
will forward our calls to it.
   Wrist watches will monitor
our sugar
 Cars will use the Internet to
find an open parking space
or the nearest vegetarian
restaurant inform the owner of
the needed service or
automatically install the
necessary (software) repair 
 Digi-tickers or implanted heart
monitors in heart patients will
talk wirelssly to computers,
which will be trained to keep
an eye open for
abnormalities.
CONCLUSION
 Pervasive computing in an increasingly networked world
continues to affect more and more of the world's population.
Although this is a global phenomenon, regional and national
social and cultural factors will directly influence the
technologies and promise of pervasive computing.
 Pervasive Computing - the next era of computer science.
PervasiveComputing.net is intended to be a information and
news website. It will cover various new developments
happening in pervasive computing area - basically mobile
computing, sensors, networking, security/privacy, ubiquitous
access to information, and related fields.
Let’s not throw the first stone, but makeLet’s not throw the first stone, but make
the first step!the first step!
THANK YOU!!!!!!!!!!
Your questions are welcome!

More Related Content

What's hot

Seminar presentation on embedded web technology
Seminar presentation on embedded web technologySeminar presentation on embedded web technology
Seminar presentation on embedded web technologyRanol R C
 
Ubiquitous Computing
Ubiquitous ComputingUbiquitous Computing
Ubiquitous Computingu065932
 
Pervasive computing
Pervasive computingPervasive computing
Pervasive computingPreethi AKNR
 
Ubiquitous Computing
Ubiquitous ComputingUbiquitous Computing
Ubiquitous ComputingKamran Ashraf
 
Ubiquitous computing
Ubiquitous computingUbiquitous computing
Ubiquitous computingPriti Punia
 
THE INTERNET OF THINGS
THE INTERNET OF THINGSTHE INTERNET OF THINGS
THE INTERNET OF THINGSRamana Reddy
 
IOT Presentation Seminar PPT
IOT Presentation Seminar PPTIOT Presentation Seminar PPT
IOT Presentation Seminar PPTHimanshu Jaswal
 
Internet of things (IOT) connects physical to digital
Internet of things (IOT) connects physical to digitalInternet of things (IOT) connects physical to digital
Internet of things (IOT) connects physical to digitalEslam Nader
 
Pervasive Computing - Let us Pervade our Future
Pervasive Computing - Let us Pervade our FuturePervasive Computing - Let us Pervade our Future
Pervasive Computing - Let us Pervade our FutureKarthikeyan V
 
Pervasive Computing: Vision and Challenges
Pervasive Computing: Vision and ChallengesPervasive Computing: Vision and Challenges
Pervasive Computing: Vision and ChallengesRaquel Salcedo Gomes
 
Introduction of Cloud computing
Introduction of Cloud computingIntroduction of Cloud computing
Introduction of Cloud computingRkrishna Mishra
 

What's hot (20)

Seminar presentation on embedded web technology
Seminar presentation on embedded web technologySeminar presentation on embedded web technology
Seminar presentation on embedded web technology
 
IOT PPT
IOT PPTIOT PPT
IOT PPT
 
Ubiquitous Computing
Ubiquitous ComputingUbiquitous Computing
Ubiquitous Computing
 
Pervasive computing
Pervasive computingPervasive computing
Pervasive computing
 
Pervasive Computing
Pervasive ComputingPervasive Computing
Pervasive Computing
 
Ubiquitous Computing
Ubiquitous ComputingUbiquitous Computing
Ubiquitous Computing
 
Ubiquitous computing
Ubiquitous computingUbiquitous computing
Ubiquitous computing
 
THE INTERNET OF THINGS
THE INTERNET OF THINGSTHE INTERNET OF THINGS
THE INTERNET OF THINGS
 
Pervasive computing
Pervasive computingPervasive computing
Pervasive computing
 
Blue eye technology ppt
Blue eye technology pptBlue eye technology ppt
Blue eye technology ppt
 
IOT Presentation Seminar PPT
IOT Presentation Seminar PPTIOT Presentation Seminar PPT
IOT Presentation Seminar PPT
 
Ubiquitous Computing
Ubiquitous ComputingUbiquitous Computing
Ubiquitous Computing
 
Ambient intelligence pranathi
Ambient intelligence pranathiAmbient intelligence pranathi
Ambient intelligence pranathi
 
Internet of things (IOT) connects physical to digital
Internet of things (IOT) connects physical to digitalInternet of things (IOT) connects physical to digital
Internet of things (IOT) connects physical to digital
 
Pervasive Computing - Let us Pervade our Future
Pervasive Computing - Let us Pervade our FuturePervasive Computing - Let us Pervade our Future
Pervasive Computing - Let us Pervade our Future
 
Ambient intelligence
Ambient intelligenceAmbient intelligence
Ambient intelligence
 
Pervasive Computing: Vision and Challenges
Pervasive Computing: Vision and ChallengesPervasive Computing: Vision and Challenges
Pervasive Computing: Vision and Challenges
 
iot seminar topic
iot seminar topic iot seminar topic
iot seminar topic
 
Internet of things ppt
Internet of things pptInternet of things ppt
Internet of things ppt
 
Introduction of Cloud computing
Introduction of Cloud computingIntroduction of Cloud computing
Introduction of Cloud computing
 

Similar to pervasive computing

pervasive-computing-09022014092937-pervasive-computing.ppt
pervasive-computing-09022014092937-pervasive-computing.pptpervasive-computing-09022014092937-pervasive-computing.ppt
pervasive-computing-09022014092937-pervasive-computing.pptRishabhRathore71
 
Pervasivecomputing 140422034057-phpapp02
Pervasivecomputing 140422034057-phpapp02Pervasivecomputing 140422034057-phpapp02
Pervasivecomputing 140422034057-phpapp02Pravallika Reddy
 
Quality Metrics In Ubiquitous Computing
Quality Metrics In Ubiquitous ComputingQuality Metrics In Ubiquitous Computing
Quality Metrics In Ubiquitous ComputingRutvik Pensionwar
 
Ubiquitous Computing
Ubiquitous ComputingUbiquitous Computing
Ubiquitous Computingsanjaymps
 
Ubiquitous computing
Ubiquitous computingUbiquitous computing
Ubiquitous computingValeria Gasik
 
Chap1 introduction to Pervasive Computing
Chap1 introduction to Pervasive ComputingChap1 introduction to Pervasive Computing
Chap1 introduction to Pervasive ComputingANUSUYA T K
 
Ubiqutous Computing
Ubiqutous ComputingUbiqutous Computing
Ubiqutous Computingdeaneal
 
Introduction to Ubiquitous Computing
Introduction to Ubiquitous ComputingIntroduction to Ubiquitous Computing
Introduction to Ubiquitous ComputingHoneyson Joseph
 
Presentation1.pptx
Presentation1.pptxPresentation1.pptx
Presentation1.pptxShailiPal1
 
Presentation1.pptx
Presentation1.pptxPresentation1.pptx
Presentation1.pptxShailiPal1
 
Pervasive computing
Pervasive computingPervasive computing
Pervasive computingPallav Kumar
 
Pervasive Computing Applications And Its Security Issues & Challenges
Pervasive Computing Applications And Its Security Issues & ChallengesPervasive Computing Applications And Its Security Issues & Challenges
Pervasive Computing Applications And Its Security Issues & Challengesiosrjce
 
WEARABLE COMPUTER.pptx
WEARABLE COMPUTER.pptxWEARABLE COMPUTER.pptx
WEARABLE COMPUTER.pptxKLakshmi13
 
Ambient intellegence
Ambient intellegenceAmbient intellegence
Ambient intellegenceLovely Singla
 
Ubiquitous computing
Ubiquitous computing Ubiquitous computing
Ubiquitous computing Govind Raj
 

Similar to pervasive computing (20)

Pervasive computing.pptx
Pervasive computing.pptxPervasive computing.pptx
Pervasive computing.pptx
 
pervasive-computing-09022014092937-pervasive-computing.ppt
pervasive-computing-09022014092937-pervasive-computing.pptpervasive-computing-09022014092937-pervasive-computing.ppt
pervasive-computing-09022014092937-pervasive-computing.ppt
 
Pervasivecomputing 140422034057-phpapp02
Pervasivecomputing 140422034057-phpapp02Pervasivecomputing 140422034057-phpapp02
Pervasivecomputing 140422034057-phpapp02
 
PERVASIVE COMPUTING
PERVASIVE COMPUTINGPERVASIVE COMPUTING
PERVASIVE COMPUTING
 
Quality Metrics In Ubiquitous Computing
Quality Metrics In Ubiquitous ComputingQuality Metrics In Ubiquitous Computing
Quality Metrics In Ubiquitous Computing
 
Ubiquitous Computing
Ubiquitous ComputingUbiquitous Computing
Ubiquitous Computing
 
Ubiquitous computing
Ubiquitous computingUbiquitous computing
Ubiquitous computing
 
Chap1 introduction to Pervasive Computing
Chap1 introduction to Pervasive ComputingChap1 introduction to Pervasive Computing
Chap1 introduction to Pervasive Computing
 
Ubiqutous Computing
Ubiqutous ComputingUbiqutous Computing
Ubiqutous Computing
 
Introduction to Ubiquitous Computing
Introduction to Ubiquitous ComputingIntroduction to Ubiquitous Computing
Introduction to Ubiquitous Computing
 
Pervasive Computing
Pervasive ComputingPervasive Computing
Pervasive Computing
 
Presentation1.pptx
Presentation1.pptxPresentation1.pptx
Presentation1.pptx
 
Presentation1.pptx
Presentation1.pptxPresentation1.pptx
Presentation1.pptx
 
Pervasive computing
Pervasive computingPervasive computing
Pervasive computing
 
O017328693
O017328693O017328693
O017328693
 
Pervasive Computing Applications And Its Security Issues & Challenges
Pervasive Computing Applications And Its Security Issues & ChallengesPervasive Computing Applications And Its Security Issues & Challenges
Pervasive Computing Applications And Its Security Issues & Challenges
 
WEARABLE COMPUTER.pptx
WEARABLE COMPUTER.pptxWEARABLE COMPUTER.pptx
WEARABLE COMPUTER.pptx
 
Ambient intellegence
Ambient intellegenceAmbient intellegence
Ambient intellegence
 
Ubiquitous computing
Ubiquitous computing Ubiquitous computing
Ubiquitous computing
 
UBIQUITOUS COMPUTING
UBIQUITOUS COMPUTINGUBIQUITOUS COMPUTING
UBIQUITOUS COMPUTING
 

Recently uploaded

main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
EduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIEduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIkoyaldeepu123
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfAsst.prof M.Gokilavani
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
DATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage exampleDATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage examplePragyanshuParadkar1
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfROCENODodongVILLACER
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEroselinkalist12
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxKartikeyaDwivedi3
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
pipeline in computer architecture design
pipeline in computer architecture  designpipeline in computer architecture  design
pipeline in computer architecture designssuser87fa0c1
 

Recently uploaded (20)

9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
EduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIEduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AI
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
DATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage exampleDATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage example
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdf
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
pipeline in computer architecture design
pipeline in computer architecture  designpipeline in computer architecture  design
pipeline in computer architecture design
 

pervasive computing

  • 1. SWEETY SINGH CSE Department SeacoEngineerinollge Pervasive Computing By Sweety Singh Computer Science Engineering Department SEACOM ENGINEERING COLLEGE WEST BENGAL - 711302
  • 2. Synopsis  Introduction  Architecture of pervasive computing  Principles of pervasive computing  Major trends in computing  Difference between ubiquitous computing and pervasive computing  Related fields  Uses of pervasive computing  Benefits of pervasive computing  Limitations of pervasive computing  Future aspects  Conclusion
  • 3. INTRODUCTION ☻ Pervasive computing (also called ubiquitous computing ) is the growing trend towards embedding microprocessors. ☻ The words pervasive and ubiquitous mean “ existing everywhere ". ☻ The aim of Pervasive Computing is for computing available wherever it's needed. It spreads intelligence and connectivity to more or less everything. ☻ Ships, Aircrafts, Cars, Bridges, Tunnels, Machines, Refrigerators, Door handles, Lighting fixtures, Shoes, Hats, Tools, Homes and even things like our coffee mugs and even the human body embedded with chips ☻ Mobile Internet access, Third-generation wireless communication, Handheld devices, and Bluetooth have made pervasive computing a reality.
  • 4. PERVASIVE COMPUTING  Pervasive computing means., 1. Anytime/anywhere: 7 days x 24 hours, global, ubiquitous access. 2. Any device: PC, Palm/PDA, cell phone, and so forth. 3. Any network: Access, Notification, Data Synchronization, Queued transactions, Wireless optimization, Security, content adaptation/reformat, development tools, device and user management. 4. Any data: E-mail, Personal Information Manager (PIM); Inter-Intranet; Public Services.
  • 5.
  • 6. Continued  Other terms for pervasive computing:  Ubiquitous computing  Calm technology  Things that think  Everywhere  Pervasive internet  Ambient intelligence  Proactive computing  Augmented reality  Characteristics of pervasive computing:  Physical integration: integration between computing nodes and the physical world, e.g., a whiteboard that records what’s on.  Instantaneous Interoperation: devices interoperate spontaneously in changing environments, e.g., a device changes its partners as it moves or as the context changes.
  • 7. Architecture  An important aspect of the difference between pervasive computing and desktop computing.
  • 9.
  • 10. Differences between Ubiquitous and Pervasive Computing Ubiquitous computing  Ubiquitous means everywhere  Ubiquitous computing is more user & application driven  involves use computers at all. Pervasive computing  Pervasive means "diffused throughout every part of“  Pervasive computing is more technology driven  involves devices like handhelds devices, notebook, palmtop etc.
  • 12. USES OF PERVASIVE COMPUTING
  • 15. ONGOING RESEARCH PROJECTS IBM ‘s “smarter planet “ The project is about building a smarter planet by including everyday case scenarios like parking the car in a place by communicating with another car.
  • 16. Benefits of pervasive computing  Manage information quickly, efficiently & effortlessly  Removes complexity of new technologies  Convenient access to relevant information stored on networks  Easily allow user to take actions anywhere, anytime  provide supplemented environment with interconnected digital technologies
  • 17. Limitations of pervasive computing  Pervasive computing is Not entirely secure  Frequent line connections that are broken  Slow connections  Very expensive operating costs
  • 18. FUTURE ASPECTS  Cell phones will ask the landline phone what its telephone number is and will forward our calls to it.    Wrist watches will monitor our sugar  Cars will use the Internet to find an open parking space or the nearest vegetarian restaurant inform the owner of the needed service or automatically install the necessary (software) repair   Digi-tickers or implanted heart monitors in heart patients will talk wirelssly to computers, which will be trained to keep an eye open for abnormalities.
  • 19. CONCLUSION  Pervasive computing in an increasingly networked world continues to affect more and more of the world's population. Although this is a global phenomenon, regional and national social and cultural factors will directly influence the technologies and promise of pervasive computing.  Pervasive Computing - the next era of computer science. PervasiveComputing.net is intended to be a information and news website. It will cover various new developments happening in pervasive computing area - basically mobile computing, sensors, networking, security/privacy, ubiquitous access to information, and related fields. Let’s not throw the first stone, but makeLet’s not throw the first stone, but make the first step!the first step!