SlideShare a Scribd company logo
1 of 21
PERVASIVE COMPUTING
By
A.Pravallika
11711A01203
Department of IT
Contents:
 What is Pervasive Computing
 Definition
 Why Pervasive Computing
 History
 Pervasive computing Components
 Pervasive Computing Networking
 Applications
 Advantages
 Disadvantages
 Conclusion
What is Pervasive Computing?
Pervasive means “EXISTING EVERYWHERE”
Pervasive computing incorporate the future of network computing
enabling wireless communication between individuals and
computing devices and between devices itself.
Pervasive Computing devices are tiny, invisible microprocessors
embedded in any type of objects like clothes,home,cars,watches
etc.,
Also known as Ubiquitous Computing.
Definition:
 In Technology View
 Computers everywhere – embedded into fridges, washing
machines, door locks, cars, furniture, people.
 intelligent environment – Lights, air conditioning, TV
automatically switch on and off when you enter or leave
rooms.
 Mobile Computing Vision –Universal connectivity to
anywhere, anytime.
 In User View
 Invisible – implicit interaction with your environment
 Augmenting human abilities in context of tasks
 Ubiquitous = mobile computing + intelligent
environment
Why Pervasive Computing?
 Pervasive computing is the growing trend towards embedding
microprocessors in everyday objects so they can communicate
information.
 pervasive computing is the concept related to the ability to
perform computing tasks on any type of devices.
 this technology is moving beyond the personal computer to
everyday devices with embedded technology .
History:
In the 21st century the technology
revolution will move into the
everyday, the small and the
invisible
“The most profound technologies are those
that disappears. ”
Mark Weiser (1952 –1999),XEROX
PARC(Palo Alto Research Center)
 Pervasive computing is the third wave of computing technologies
to emerge since computers first appeared:
 First Wave - Mainframe computing era: one computer shared
by many people, via workstations.
 Second Wave - Personal computing era: one computer used
by one person, requiring a conscious interaction. Users
largely bound to desktop.
 Third Wave – Pervasive computing era: one person, many
computers. Millions of computers embedded in the
environment, allowing technology to recede into the
background.
Pervasive Computing Components
 Pervasive computing involves three converging areas of
Information and Communications Technology(CIT):
 Computing (‘smart devices’),
 Communications (‘connectivity’)
 User interfaces
Smart Devices
can communicate with each other
sensors: input devices that detect environmental changes, user
behaviors, human commands etc;
processors: electronic systems that analyze input-data;
actuators: output devices that respond to processed
information by altering the environment via electronic or
mechanical means.
For example, air temperature control is often done with
actuators. However the term can also refer to devices which
deliver information rather than altering the environment
physically.
Connectivity (network)
• Many existing and emerging wireless technologies serve in
Pervasive Computing:
 Zigbee and Bluetooth :sensors and actuators - low
energy consumption, short distances (up to 10 meters)
 Wi-Fi - devices : middle ranges (several hundreds of meters)
 3G /4G : A home gateway to Internet - long ranges (several to
tens of kilometres)
User Interfaces
 point of contact between ICT and human
 Active: Users control PC technologies and devices
 Passive: PC control in the background
 For example recognizing a person’s face. It might also be
based on sound, touch recognition, or other sensory
information like temperature.
PERVASIVE NETWORKING
 Pervasive networking is the ability for devices to
autonomously arrange themselves into local networks and
exchange information through these networks.
 Components of Pervasive networking:
Pervasive Network Layer
Pervasive Access Layer
Pervasive Device Layer
Pervasive Human Machine Interaction Layer
Pervasive Human Core Layer
Layers of Pervasive Networking
 Pervasive Network Layer
This layer includes all networks and the networks are
connected directly or indirectly to the internet. Server and
Gateways are the important parts in this layer.
 Pervasive Access Layer
This layer deals with pervasive network connection
issues. Issues considered in this layer are Service Discovery
and Management, network access protocols.
Layers of Pervasive Networking
 Pervasive Device Layer
This layer includes all user interactive devices whether they
are interacted directly or indirectly. Issues considered in this
layer are Sensors and Smart Devices.
 Pervasive HMI Layer
This layer deals Human interaction with all network
accessed devices.
Layers of Pervasive Networking
 Pervasive Human Core Layer
This layer is the inner layer of the Pervasive networking.
Issues in this layer are based on the various applications.
Applications considered for human core layer are such as
Health care, smart home, business application etc.,
Applications Of Pervasive Computing
 Healthcare
 Intelligent bandages that can tell how the injury is doing
or video consultations with doctors, that can treat
patients at home.
 Home care
 Transport
 Environmental Monitoring
 Industry & Academia
Example:
 A visitor brings his/her laptop into a meeting room and without
manually configuring it in any way uses it to send his
presentation to the room’s projector
 Physical integration: the projector can be activated from any
laptop in the room
 Instantant interoperation: A laptop can spontaneously
interact with the projector and control the presentation
 Can be made context-sensitive, e.g., allowing only a particular
visitor to do so
ADVANTAGES OF PERVASIVE COMPUTING
 Manage information quickly, efficiently and
effortlessly.
 Convenient access to relevant information stored on
networks, allowing them to easily take action anywhere,
anytime.
 Environment will be supplemented with interconnected
digital technologies.
DISADVANTAGES OF
PERVASIVE COMPUTING
 Pervasive Computing is not entirely secure.
 Frequent line connections that are broken.
 Slow Connections.
 Very expensive operating costs.
CONCLUSION
 Information can be accessed when and where it is needed.
 Imagine Having a SINGLE remote to control all your
Electronic Gadgets.
 But still Privacy and Security major drawbacks of the
Pervasive Computing.
Pervasivecomputing 140422034057-phpapp02

More Related Content

What's hot

Ubiquitous computing presentation 2
Ubiquitous computing presentation 2Ubiquitous computing presentation 2
Ubiquitous computing presentation 2Arpan Patel
 
Pervasive Computing - Let us Pervade our Future
Pervasive Computing - Let us Pervade our FuturePervasive Computing - Let us Pervade our Future
Pervasive Computing - Let us Pervade our FutureKarthikeyan V
 
Pervasive computing
Pervasive computingPervasive computing
Pervasive computingKelly Zhang
 
Context-Aware Computing
Context-Aware ComputingContext-Aware Computing
Context-Aware Computinglogus2k
 
The evolution of pervasive computing towards a Web of Things
The evolution of pervasive computing towards a Web of ThingsThe evolution of pervasive computing towards a Web of Things
The evolution of pervasive computing towards a Web of ThingsAndreas Kamilaris
 
Project oxygen
Project oxygenProject oxygen
Project oxygenlinkoravi
 
wireless sensor networks based on iot
wireless sensor networks based on iotwireless sensor networks based on iot
wireless sensor networks based on iotEswari Cheedella
 
Report-Fog Based Emergency System For Smart Enhanced Living Environment
Report-Fog Based Emergency System For Smart Enhanced Living EnvironmentReport-Fog Based Emergency System For Smart Enhanced Living Environment
Report-Fog Based Emergency System For Smart Enhanced Living EnvironmentKEERTHANA M
 
Presentation mobile computing
Presentation mobile computingPresentation mobile computing
Presentation mobile computingcegonsoft1999
 
Ubiquitous Computing
Ubiquitous ComputingUbiquitous Computing
Ubiquitous Computingsanjaymps
 
Context Aware Computing
Context Aware ComputingContext Aware Computing
Context Aware ComputingMOHIT DADU
 
Past, Present and Future of Mobile Computing
Past, Present and Future of Mobile ComputingPast, Present and Future of Mobile Computing
Past, Present and Future of Mobile ComputingDavid Livingston J
 
IOT - Design Principles of Connected Devices
IOT - Design Principles of Connected DevicesIOT - Design Principles of Connected Devices
IOT - Design Principles of Connected DevicesDevyani Vasistha
 
Ubiquitous Computing A Next Generation Perspective
Ubiquitous Computing A Next Generation PerspectiveUbiquitous Computing A Next Generation Perspective
Ubiquitous Computing A Next Generation PerspectiveSharbani Bhattacharya
 
The internet of things
The internet of thingsThe internet of things
The internet of thingsSai Avinash
 

What's hot (20)

Pervasive computing
Pervasive computingPervasive computing
Pervasive computing
 
Pervasive Computing
Pervasive ComputingPervasive Computing
Pervasive Computing
 
Ubiquitous computing presentation 2
Ubiquitous computing presentation 2Ubiquitous computing presentation 2
Ubiquitous computing presentation 2
 
Pervasive Computing - Let us Pervade our Future
Pervasive Computing - Let us Pervade our FuturePervasive Computing - Let us Pervade our Future
Pervasive Computing - Let us Pervade our Future
 
Pervasive Computing
Pervasive ComputingPervasive Computing
Pervasive Computing
 
Pervasive computing
Pervasive computingPervasive computing
Pervasive computing
 
Context-Aware Computing
Context-Aware ComputingContext-Aware Computing
Context-Aware Computing
 
The evolution of pervasive computing towards a Web of Things
The evolution of pervasive computing towards a Web of ThingsThe evolution of pervasive computing towards a Web of Things
The evolution of pervasive computing towards a Web of Things
 
Project oxygen
Project oxygenProject oxygen
Project oxygen
 
Ubiquitous home
Ubiquitous homeUbiquitous home
Ubiquitous home
 
wireless sensor networks based on iot
wireless sensor networks based on iotwireless sensor networks based on iot
wireless sensor networks based on iot
 
Report-Fog Based Emergency System For Smart Enhanced Living Environment
Report-Fog Based Emergency System For Smart Enhanced Living EnvironmentReport-Fog Based Emergency System For Smart Enhanced Living Environment
Report-Fog Based Emergency System For Smart Enhanced Living Environment
 
Presentation mobile computing
Presentation mobile computingPresentation mobile computing
Presentation mobile computing
 
Ubiquitous Computing
Ubiquitous ComputingUbiquitous Computing
Ubiquitous Computing
 
Context Aware Computing
Context Aware ComputingContext Aware Computing
Context Aware Computing
 
Past, Present and Future of Mobile Computing
Past, Present and Future of Mobile ComputingPast, Present and Future of Mobile Computing
Past, Present and Future of Mobile Computing
 
IOT - Design Principles of Connected Devices
IOT - Design Principles of Connected DevicesIOT - Design Principles of Connected Devices
IOT - Design Principles of Connected Devices
 
Ubiquitous Computing A Next Generation Perspective
Ubiquitous Computing A Next Generation PerspectiveUbiquitous Computing A Next Generation Perspective
Ubiquitous Computing A Next Generation Perspective
 
The internet of things
The internet of thingsThe internet of things
The internet of things
 
Mobile and wireless computing
Mobile and wireless computingMobile and wireless computing
Mobile and wireless computing
 

Similar to Pervasivecomputing 140422034057-phpapp02

pervasive-computing-09022014092937-pervasive-computing.ppt
pervasive-computing-09022014092937-pervasive-computing.pptpervasive-computing-09022014092937-pervasive-computing.ppt
pervasive-computing-09022014092937-pervasive-computing.pptRishabhRathore71
 
Quality Metrics In Ubiquitous Computing
Quality Metrics In Ubiquitous ComputingQuality Metrics In Ubiquitous Computing
Quality Metrics In Ubiquitous ComputingRutvik Pensionwar
 
Presentation1.pptx
Presentation1.pptxPresentation1.pptx
Presentation1.pptxShailiPal1
 
Presentation1.pptx
Presentation1.pptxPresentation1.pptx
Presentation1.pptxShailiPal1
 
Unit_1_IOT_INTRO.pptx
Unit_1_IOT_INTRO.pptxUnit_1_IOT_INTRO.pptx
Unit_1_IOT_INTRO.pptxBharat Tank
 
Ubiquitous networking
Ubiquitous networkingUbiquitous networking
Ubiquitous networkingAashish Jain
 
WEARABLE COMPUTER.pptx
WEARABLE COMPUTER.pptxWEARABLE COMPUTER.pptx
WEARABLE COMPUTER.pptxKLakshmi13
 
Ubiquitous computing abstract
Ubiquitous computing abstractUbiquitous computing abstract
Ubiquitous computing abstractPriti Punia
 
Ambient intellegence
Ambient intellegenceAmbient intellegence
Ambient intellegenceLovely Singla
 
Introduction to Ubiquitous Computing
Introduction to Ubiquitous ComputingIntroduction to Ubiquitous Computing
Introduction to Ubiquitous ComputingHoneyson Joseph
 
Distributed systems
Distributed systemsDistributed systems
Distributed systemssree kanth
 
A Study Mobile Computing
A Study   Mobile ComputingA Study   Mobile Computing
A Study Mobile ComputingSara Alvarez
 
Shradha maheshwari wearable computers 11-09-10
Shradha maheshwari wearable computers 11-09-10Shradha maheshwari wearable computers 11-09-10
Shradha maheshwari wearable computers 11-09-10Shradha Maheshwari
 
IoT for Everyday Life
IoT for Everyday LifeIoT for Everyday Life
IoT for Everyday Lifeijsrd.com
 

Similar to Pervasivecomputing 140422034057-phpapp02 (20)

pervasive-computing-09022014092937-pervasive-computing.ppt
pervasive-computing-09022014092937-pervasive-computing.pptpervasive-computing-09022014092937-pervasive-computing.ppt
pervasive-computing-09022014092937-pervasive-computing.ppt
 
Pervasive Computing
Pervasive ComputingPervasive Computing
Pervasive Computing
 
Quality Metrics In Ubiquitous Computing
Quality Metrics In Ubiquitous ComputingQuality Metrics In Ubiquitous Computing
Quality Metrics In Ubiquitous Computing
 
Mobile Computing
Mobile ComputingMobile Computing
Mobile Computing
 
Ubiquitous Computing
Ubiquitous ComputingUbiquitous Computing
Ubiquitous Computing
 
Presentation1.pptx
Presentation1.pptxPresentation1.pptx
Presentation1.pptx
 
Presentation1.pptx
Presentation1.pptxPresentation1.pptx
Presentation1.pptx
 
Unit_1_IOT_INTRO.pptx
Unit_1_IOT_INTRO.pptxUnit_1_IOT_INTRO.pptx
Unit_1_IOT_INTRO.pptx
 
Ubiquitous networking
Ubiquitous networkingUbiquitous networking
Ubiquitous networking
 
WEARABLE COMPUTER.pptx
WEARABLE COMPUTER.pptxWEARABLE COMPUTER.pptx
WEARABLE COMPUTER.pptx
 
Home Automation
Home AutomationHome Automation
Home Automation
 
Ubiquitous computing abstract
Ubiquitous computing abstractUbiquitous computing abstract
Ubiquitous computing abstract
 
PERVASIVE COMPUTING
PERVASIVE COMPUTINGPERVASIVE COMPUTING
PERVASIVE COMPUTING
 
Ambient intellegence
Ambient intellegenceAmbient intellegence
Ambient intellegence
 
Introduction to Ubiquitous Computing
Introduction to Ubiquitous ComputingIntroduction to Ubiquitous Computing
Introduction to Ubiquitous Computing
 
Distributed systems
Distributed systemsDistributed systems
Distributed systems
 
O017328693
O017328693O017328693
O017328693
 
A Study Mobile Computing
A Study   Mobile ComputingA Study   Mobile Computing
A Study Mobile Computing
 
Shradha maheshwari wearable computers 11-09-10
Shradha maheshwari wearable computers 11-09-10Shradha maheshwari wearable computers 11-09-10
Shradha maheshwari wearable computers 11-09-10
 
IoT for Everyday Life
IoT for Everyday LifeIoT for Everyday Life
IoT for Everyday Life
 

Recently uploaded

What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
An introduction to Semiconductor and its types.pptx
An introduction to Semiconductor and its types.pptxAn introduction to Semiconductor and its types.pptx
An introduction to Semiconductor and its types.pptxPurva Nikam
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .Satyam Kumar
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)Dr SOUNDIRARAJ N
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvLewisJB
 
computer application and construction management
computer application and construction managementcomputer application and construction management
computer application and construction managementMariconPadriquez1
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...Chandu841456
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
Correctly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleCorrectly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleAlluxio, Inc.
 

Recently uploaded (20)

What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
An introduction to Semiconductor and its types.pptx
An introduction to Semiconductor and its types.pptxAn introduction to Semiconductor and its types.pptx
An introduction to Semiconductor and its types.pptx
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvv
 
computer application and construction management
computer application and construction managementcomputer application and construction management
computer application and construction management
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...
 
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Serviceyoung call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
Correctly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleCorrectly Loading Incremental Data at Scale
Correctly Loading Incremental Data at Scale
 

Pervasivecomputing 140422034057-phpapp02

  • 2. Contents:  What is Pervasive Computing  Definition  Why Pervasive Computing  History  Pervasive computing Components  Pervasive Computing Networking  Applications  Advantages  Disadvantages  Conclusion
  • 3. What is Pervasive Computing? Pervasive means “EXISTING EVERYWHERE” Pervasive computing incorporate the future of network computing enabling wireless communication between individuals and computing devices and between devices itself. Pervasive Computing devices are tiny, invisible microprocessors embedded in any type of objects like clothes,home,cars,watches etc., Also known as Ubiquitous Computing.
  • 4. Definition:  In Technology View  Computers everywhere – embedded into fridges, washing machines, door locks, cars, furniture, people.  intelligent environment – Lights, air conditioning, TV automatically switch on and off when you enter or leave rooms.  Mobile Computing Vision –Universal connectivity to anywhere, anytime.  In User View  Invisible – implicit interaction with your environment  Augmenting human abilities in context of tasks  Ubiquitous = mobile computing + intelligent environment
  • 5. Why Pervasive Computing?  Pervasive computing is the growing trend towards embedding microprocessors in everyday objects so they can communicate information.  pervasive computing is the concept related to the ability to perform computing tasks on any type of devices.  this technology is moving beyond the personal computer to everyday devices with embedded technology .
  • 6. History: In the 21st century the technology revolution will move into the everyday, the small and the invisible “The most profound technologies are those that disappears. ” Mark Weiser (1952 –1999),XEROX PARC(Palo Alto Research Center)
  • 7.  Pervasive computing is the third wave of computing technologies to emerge since computers first appeared:  First Wave - Mainframe computing era: one computer shared by many people, via workstations.  Second Wave - Personal computing era: one computer used by one person, requiring a conscious interaction. Users largely bound to desktop.  Third Wave – Pervasive computing era: one person, many computers. Millions of computers embedded in the environment, allowing technology to recede into the background.
  • 8. Pervasive Computing Components  Pervasive computing involves three converging areas of Information and Communications Technology(CIT):  Computing (‘smart devices’),  Communications (‘connectivity’)  User interfaces
  • 9. Smart Devices can communicate with each other sensors: input devices that detect environmental changes, user behaviors, human commands etc; processors: electronic systems that analyze input-data; actuators: output devices that respond to processed information by altering the environment via electronic or mechanical means. For example, air temperature control is often done with actuators. However the term can also refer to devices which deliver information rather than altering the environment physically.
  • 10. Connectivity (network) • Many existing and emerging wireless technologies serve in Pervasive Computing:  Zigbee and Bluetooth :sensors and actuators - low energy consumption, short distances (up to 10 meters)  Wi-Fi - devices : middle ranges (several hundreds of meters)  3G /4G : A home gateway to Internet - long ranges (several to tens of kilometres)
  • 11. User Interfaces  point of contact between ICT and human  Active: Users control PC technologies and devices  Passive: PC control in the background  For example recognizing a person’s face. It might also be based on sound, touch recognition, or other sensory information like temperature.
  • 12. PERVASIVE NETWORKING  Pervasive networking is the ability for devices to autonomously arrange themselves into local networks and exchange information through these networks.  Components of Pervasive networking: Pervasive Network Layer Pervasive Access Layer Pervasive Device Layer Pervasive Human Machine Interaction Layer Pervasive Human Core Layer
  • 13. Layers of Pervasive Networking  Pervasive Network Layer This layer includes all networks and the networks are connected directly or indirectly to the internet. Server and Gateways are the important parts in this layer.  Pervasive Access Layer This layer deals with pervasive network connection issues. Issues considered in this layer are Service Discovery and Management, network access protocols.
  • 14. Layers of Pervasive Networking  Pervasive Device Layer This layer includes all user interactive devices whether they are interacted directly or indirectly. Issues considered in this layer are Sensors and Smart Devices.  Pervasive HMI Layer This layer deals Human interaction with all network accessed devices.
  • 15. Layers of Pervasive Networking  Pervasive Human Core Layer This layer is the inner layer of the Pervasive networking. Issues in this layer are based on the various applications. Applications considered for human core layer are such as Health care, smart home, business application etc.,
  • 16. Applications Of Pervasive Computing  Healthcare  Intelligent bandages that can tell how the injury is doing or video consultations with doctors, that can treat patients at home.  Home care  Transport  Environmental Monitoring  Industry & Academia
  • 17. Example:  A visitor brings his/her laptop into a meeting room and without manually configuring it in any way uses it to send his presentation to the room’s projector  Physical integration: the projector can be activated from any laptop in the room  Instantant interoperation: A laptop can spontaneously interact with the projector and control the presentation  Can be made context-sensitive, e.g., allowing only a particular visitor to do so
  • 18. ADVANTAGES OF PERVASIVE COMPUTING  Manage information quickly, efficiently and effortlessly.  Convenient access to relevant information stored on networks, allowing them to easily take action anywhere, anytime.  Environment will be supplemented with interconnected digital technologies.
  • 19. DISADVANTAGES OF PERVASIVE COMPUTING  Pervasive Computing is not entirely secure.  Frequent line connections that are broken.  Slow Connections.  Very expensive operating costs.
  • 20. CONCLUSION  Information can be accessed when and where it is needed.  Imagine Having a SINGLE remote to control all your Electronic Gadgets.  But still Privacy and Security major drawbacks of the Pervasive Computing.