SlideShare a Scribd company logo
Ali Bahu
03/24/2013
PERVASIVE
COMPUTING
INTRODUCTION
 An environment in which people interact with embedded (and
mostly invisible) computers (processors) and in which networked
devices are aware of their surroundings and peers and are able to
provide services or use services from peers effectively. It is the
ability to access information and software applications anytime
and anywhere. It is also Known as:
 Pervasive Computing
 Ubiquitous Computing
 Ambient Intelligence
 Wearable Computing
 Context Awareness
TODAY:
Cool toys…
OUR WORLD TODAY:
 Devices increasingly more
powerful.
 Devices are also becoming
smaller & cheaper.
 People interact daily with
hundreds of computing devices
(many of them mobile):
 Cars
 Desktops/Laptops
 Cell phones
 PDAs
 MP3 players
 Transportation passes, etc.
JUST NOW…
Too bad they
can’t talk to
each other…
TODAY…
Configuration?
Too much work…
GOALS OF PERVASIVE
COMPUTING
 As our lives are full of devices and gadgets with different
functionalities and abilities, it is becoming harder to keep track of
each one of them and use them efficiently and seamlessly. This is
where the pervasive computing come is into the picture with the
following goals:
 Invisible technology
 Integration of virtual and physical worlds
 Throughout desks, rooms, buildings, and life
 Take the data out of environment, leaving behind just an enhanced ability to act.
 Devices and services communicating with each other without any human
intervention or help.
PERVASIVE COMPUTING
APPLICATIONS
 Always running and available.
 Composed of collaborating parts spared over the network –
distributed components.
 Adapt to environments when the users/devices move –
reconfigure to use available services.
 Users are not aware of the computing embedded in the device –
transparent interaction.
 Information pursues the user rather than user pursues the
information.
SERVICE DISCOVERY
 Goal – allow devices to advertise, discover, configure, and
communicate with each other in a mobile network
 Example – when a device is moving between networks, it needs to
know what services are still available, will be available, and no longer
available. It also needs to know how to contact to these services.
Then, based on the resources, the device is able to perform its task and
for that Service Discovery Protocols are used.
 Service Discovery Protocols – protocol to facilitate association of
devices that have services to offer or that need services
 Enable interoperability
 Communication between devices
 Accommodate heterogeneity
 Devices can be of different kind
 Minimize administrative overhead
 Increase usability
 Simplified design time implementation
SERVICE LOCATION PROTOCOL
 A service discovery protocol for advertisement and discovery of network
services.
 Each service has a service type, which defines a collection of services
with a common nature.
 Each service has a name and a list of characteristics where each
characteristic is defined by a attribute-value pairing and Service with the
same service type have similar attributes but different values.
 For a device to connect to a service, a Service Access Point (SAP) is
needed which contains information about where and how to get the
service and secondly the structure of SAP is defined by URLs of
scheme service.
CONT.
 For the device to know if a service is what it needs, a Service
Advertisement is needed which contains information describing a
service including Service Type, the values of the attributes, and the
Service Access Point.
 Each device can be defined as an User Agent (UA) or a Service Agent
(SA) where User Agents are consumers of service and Service Agents
are providers of service.
 (Optionally) there is also a Directory Agent (DA) that maintains service
advertisements
 Many other service discovery protocols are available for example
Jini, Bluetooth, UPnP, Salutation, etc.
 The protocols are usually compose of the service clients (UA), service
providers (SA), and service directories (DA)
SERVICE DISCOVERY
PROTOCOLS
CHALLENGES
 Invisibility – disappearance of computing technology from users'
consciousness; embedding/combining computing infrastructure with
building infrastructure
 Scalability – scalability of users, devices, density of interactions in a
local area
 Availability – access to software applications and information anytime
and anywhere
 Dynamic – users and devices are mobile, services are provided by
collaborating distributed components
 Heterogeneity – variety of hardware, software platforms, network
protocols, service providers
 Integration with people – personal privacy, user intentions, access
control

More Related Content

What's hot

A short discussion on cloud computing
A short discussion on cloud computingA short discussion on cloud computing
A short discussion on cloud computing
Zubair Ansari
 
cloud-computing
cloud-computingcloud-computing
cloud-computing
Suneel Dogra
 
Cloud computing
Cloud computingCloud computing
Cloud computing
Dhairya Gupta
 
When revenue intelligence meets the cloud
When revenue intelligence meets the cloudWhen revenue intelligence meets the cloud
When revenue intelligence meets the cloud
cVidya Networks
 
Cloud computing
Cloud computingCloud computing
Cloud computing
Ibrahima SOUMARE
 
Social Cloud: Cloud Computing in Social Networks
Social Cloud: Cloud Computing in Social NetworksSocial Cloud: Cloud Computing in Social Networks
Social Cloud: Cloud Computing in Social Networks
Simon Caton
 
Cloud Ecosystem
Cloud EcosystemCloud Ecosystem
Cloud Ecosystem
Arief Gunawan
 
Cloud comouting
Cloud comoutingCloud comouting
Cloud comouting
Monty Paul
 
Cloud computing
Cloud computingCloud computing
Cloud computing
FluperOfficial
 
2.evaluating cloud platforms
2.evaluating cloud platforms2.evaluating cloud platforms
2.evaluating cloud platforms
DrRajapraveenkN
 
Cloud
CloudCloud
Cloud computing
Cloud computingCloud computing
Cloud computing
lovepreet kaur
 
What is hybrid cloud computing
What is hybrid cloud computingWhat is hybrid cloud computing
What is hybrid cloud computing
Shikha Sharma
 
cloud computing tutorial
cloud computing tutorialcloud computing tutorial
cloud computing tutorial
Harshita Kulshreshtha
 
Cloud interoperability
Cloud interoperabilityCloud interoperability
Cloud interoperability
gaurav jain
 
Cloud computing ravi namboori
Cloud computing ravi nambooriCloud computing ravi namboori
Cloud computing ravi namboori
ravi namboori
 

What's hot (18)

Definition of cloud computing
Definition of cloud computingDefinition of cloud computing
Definition of cloud computing
 
A short discussion on cloud computing
A short discussion on cloud computingA short discussion on cloud computing
A short discussion on cloud computing
 
Characteristics of cloud computing
Characteristics of cloud computingCharacteristics of cloud computing
Characteristics of cloud computing
 
cloud-computing
cloud-computingcloud-computing
cloud-computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
When revenue intelligence meets the cloud
When revenue intelligence meets the cloudWhen revenue intelligence meets the cloud
When revenue intelligence meets the cloud
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Social Cloud: Cloud Computing in Social Networks
Social Cloud: Cloud Computing in Social NetworksSocial Cloud: Cloud Computing in Social Networks
Social Cloud: Cloud Computing in Social Networks
 
Cloud Ecosystem
Cloud EcosystemCloud Ecosystem
Cloud Ecosystem
 
Cloud comouting
Cloud comoutingCloud comouting
Cloud comouting
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
2.evaluating cloud platforms
2.evaluating cloud platforms2.evaluating cloud platforms
2.evaluating cloud platforms
 
Cloud
CloudCloud
Cloud
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
What is hybrid cloud computing
What is hybrid cloud computingWhat is hybrid cloud computing
What is hybrid cloud computing
 
cloud computing tutorial
cloud computing tutorialcloud computing tutorial
cloud computing tutorial
 
Cloud interoperability
Cloud interoperabilityCloud interoperability
Cloud interoperability
 
Cloud computing ravi namboori
Cloud computing ravi nambooriCloud computing ravi namboori
Cloud computing ravi namboori
 

Viewers also liked

EclipseMAT
EclipseMATEclipseMAT
EclipseMATAli Bahu
 
EMMS 2015: De la superación a la super-acción
EMMS 2015: De la superación a la super-acciónEMMS 2015: De la superación a la super-acción
EMMS 2015: De la superación a la super-acción
FromDoppler
 
Hawianholdings
HawianholdingsHawianholdings
Hawianholdings
Charlie Graham Twin-c
 
Doppler Academy: Cómo convertir seguidores y fans en clientes
Doppler Academy: Cómo convertir seguidores y fans en clientesDoppler Academy: Cómo convertir seguidores y fans en clientes
Doppler Academy: Cómo convertir seguidores y fans en clientes
FromDoppler
 
Cartelismo Francés
Cartelismo FrancésCartelismo Francés
Cartelismo Francés
Felipe Gutiérrez Silva
 
Pocognoni disagio oculare ii meeting marchigiano
Pocognoni disagio oculare ii meeting marchigianoPocognoni disagio oculare ii meeting marchigiano
Pocognoni disagio oculare ii meeting marchigiano
Rudycantfail
 
Top 5 Java Performance Metrics, Tips & Tricks
Top 5 Java Performance Metrics, Tips & TricksTop 5 Java Performance Metrics, Tips & Tricks
Top 5 Java Performance Metrics, Tips & Tricks
AppDynamics
 
Apache Ant
Apache AntApache Ant
Apache AntAli Bahu
 
Apache Ant
Apache AntApache Ant
Apache AntAli Bahu
 
Despacho Prestação de Contas Campanha Dilma
Despacho Prestação de Contas Campanha DilmaDespacho Prestação de Contas Campanha Dilma
Despacho Prestação de Contas Campanha Dilma
Salomão Pamplona
 
Company website presentation final april 2016
Company website presentation final   april 2016Company website presentation final   april 2016
Company website presentation final april 2016
AnteroResources
 
Projecte interdisciplinari definitiu
Projecte interdisciplinari definitiuProjecte interdisciplinari definitiu
Projecte interdisciplinari definitiu
mariscotbasimma
 
Tecnologías de la información y la comunicación
Tecnologías de la información y la comunicaciónTecnologías de la información y la comunicación
Tecnologías de la información y la comunicación
soda16
 
INSTRUCTIVO PARA LA PRESENTACIÓN DE CARPETAS DE ANTECEDENTES CONCURSO DE ASPI...
INSTRUCTIVO PARA LA PRESENTACIÓN DE CARPETAS DE ANTECEDENTES CONCURSO DE ASPI...INSTRUCTIVO PARA LA PRESENTACIÓN DE CARPETAS DE ANTECEDENTES CONCURSO DE ASPI...
INSTRUCTIVO PARA LA PRESENTACIÓN DE CARPETAS DE ANTECEDENTES CONCURSO DE ASPI...
helidiseno
 
Primer intento tecnología de la información
Primer intento tecnología de la informaciónPrimer intento tecnología de la información
Primer intento tecnología de la informacióntecnologia_vanessa
 
TICVEGADEO
TICVEGADEOTICVEGADEO
TICVEGADEO
Fundación Impuls
 

Viewers also liked (20)

Jhiccup
JhiccupJhiccup
Jhiccup
 
EclipseMAT
EclipseMATEclipseMAT
EclipseMAT
 
EMMS 2015: De la superación a la super-acción
EMMS 2015: De la superación a la super-acciónEMMS 2015: De la superación a la super-acción
EMMS 2015: De la superación a la super-acción
 
Hawianholdings
HawianholdingsHawianholdings
Hawianholdings
 
Doppler Academy: Cómo convertir seguidores y fans en clientes
Doppler Academy: Cómo convertir seguidores y fans en clientesDoppler Academy: Cómo convertir seguidores y fans en clientes
Doppler Academy: Cómo convertir seguidores y fans en clientes
 
Cartelismo Francés
Cartelismo FrancésCartelismo Francés
Cartelismo Francés
 
Pocognoni disagio oculare ii meeting marchigiano
Pocognoni disagio oculare ii meeting marchigianoPocognoni disagio oculare ii meeting marchigiano
Pocognoni disagio oculare ii meeting marchigiano
 
Hadoop
HadoopHadoop
Hadoop
 
Top 5 Java Performance Metrics, Tips & Tricks
Top 5 Java Performance Metrics, Tips & TricksTop 5 Java Performance Metrics, Tips & Tricks
Top 5 Java Performance Metrics, Tips & Tricks
 
Apache Ant
Apache AntApache Ant
Apache Ant
 
Apache Ant
Apache AntApache Ant
Apache Ant
 
Despacho Prestação de Contas Campanha Dilma
Despacho Prestação de Contas Campanha DilmaDespacho Prestação de Contas Campanha Dilma
Despacho Prestação de Contas Campanha Dilma
 
Company website presentation final april 2016
Company website presentation final   april 2016Company website presentation final   april 2016
Company website presentation final april 2016
 
Projecte interdisciplinari definitiu
Projecte interdisciplinari definitiuProjecte interdisciplinari definitiu
Projecte interdisciplinari definitiu
 
Tecnologías de la información y la comunicación
Tecnologías de la información y la comunicaciónTecnologías de la información y la comunicación
Tecnologías de la información y la comunicación
 
INSTRUCTIVO PARA LA PRESENTACIÓN DE CARPETAS DE ANTECEDENTES CONCURSO DE ASPI...
INSTRUCTIVO PARA LA PRESENTACIÓN DE CARPETAS DE ANTECEDENTES CONCURSO DE ASPI...INSTRUCTIVO PARA LA PRESENTACIÓN DE CARPETAS DE ANTECEDENTES CONCURSO DE ASPI...
INSTRUCTIVO PARA LA PRESENTACIÓN DE CARPETAS DE ANTECEDENTES CONCURSO DE ASPI...
 
Thava
ThavaThava
Thava
 
Ctdl 1999
Ctdl   1999Ctdl   1999
Ctdl 1999
 
Primer intento tecnología de la información
Primer intento tecnología de la informaciónPrimer intento tecnología de la información
Primer intento tecnología de la información
 
TICVEGADEO
TICVEGADEOTICVEGADEO
TICVEGADEO
 

Similar to Pervasive computing

Multiple user interfaces and crossplatform
Multiple user interfaces and crossplatformMultiple user interfaces and crossplatform
Multiple user interfaces and crossplatform
csandit
 
A survey of service Discovery Architecture of MANET with AODV-SD
A survey of service Discovery Architecture of MANET with AODV-SDA survey of service Discovery Architecture of MANET with AODV-SD
A survey of service Discovery Architecture of MANET with AODV-SD
Editor IJCATR
 
Distributed computing
Distributed computingDistributed computing
Distributed computing
Alokeparna Choudhury
 
Cse rover-technology-report
Cse rover-technology-reportCse rover-technology-report
Cse rover-technology-report
nagxenapp
 
IRJET- Pervasive Computing Service Discovery in Secure Framework Environment
IRJET- Pervasive Computing Service Discovery in Secure Framework EnvironmentIRJET- Pervasive Computing Service Discovery in Secure Framework Environment
IRJET- Pervasive Computing Service Discovery in Secure Framework Environment
IRJET Journal
 
A Converged Approach to Standards for Industrial Automation
A Converged Approach to Standards for Industrial AutomationA Converged Approach to Standards for Industrial Automation
A Converged Approach to Standards for Industrial Automation
Gerardo Pardo-Castellote
 
e-suap cloud computing- English version
e-suap cloud computing- English versione-suap cloud computing- English version
e-suap cloud computing- English version
Sabino Labarile
 
D sys ch-vvdp-unit-1
D sys ch-vvdp-unit-1D sys ch-vvdp-unit-1
D sys ch-vvdp-unit-1
shaik subhani
 
A Study Mobile Computing
A Study   Mobile ComputingA Study   Mobile Computing
A Study Mobile Computing
Sara Alvarez
 
Mobile Technology
Mobile TechnologyMobile Technology
Mobile Technology
Swapnali Pawar
 
Onubha brochure
Onubha brochureOnubha brochure
Onubha brochureOlsen Song
 
Middleware.pptx
Middleware.pptxMiddleware.pptx
Middleware.pptx
yudragispi
 
Pervasive computing
Pervasive computingPervasive computing
Pervasive computing
Pallav Kumar
 
Quality Metrics In Ubiquitous Computing
Quality Metrics In Ubiquitous ComputingQuality Metrics In Ubiquitous Computing
Quality Metrics In Ubiquitous Computing
Rutvik Pensionwar
 
Live Matches , Streaming , Scores
Live Matches , Streaming , ScoresLive Matches , Streaming , Scores
Live Matches , Streaming , Scores
webcric .site
 
Mobile technology-Unit 1
Mobile technology-Unit 1Mobile technology-Unit 1
Mobile technology-Unit 1
Swapnali Pawar
 
Ambiences on the-fly usage of available resources through personal devices
Ambiences  on the-fly usage of available resources through personal devicesAmbiences  on the-fly usage of available resources through personal devices
Ambiences on the-fly usage of available resources through personal devices
ijasuc
 
Mobile agents in a distributed multimedia dabase system(synopsis)
Mobile agents in a distributed multimedia dabase system(synopsis)Mobile agents in a distributed multimedia dabase system(synopsis)
Mobile agents in a distributed multimedia dabase system(synopsis)Mumbai Academisc
 
JAVA 2013 IEEE MOBILECOMPUTING PROJECT A scalable server architecture for mob...
JAVA 2013 IEEE MOBILECOMPUTING PROJECT A scalable server architecture for mob...JAVA 2013 IEEE MOBILECOMPUTING PROJECT A scalable server architecture for mob...
JAVA 2013 IEEE MOBILECOMPUTING PROJECT A scalable server architecture for mob...
IEEEGLOBALSOFTTECHNOLOGIES
 
A scalable server architecture for mobile presence services in social network...
A scalable server architecture for mobile presence services in social network...A scalable server architecture for mobile presence services in social network...
A scalable server architecture for mobile presence services in social network...
IEEEFINALYEARPROJECTS
 

Similar to Pervasive computing (20)

Multiple user interfaces and crossplatform
Multiple user interfaces and crossplatformMultiple user interfaces and crossplatform
Multiple user interfaces and crossplatform
 
A survey of service Discovery Architecture of MANET with AODV-SD
A survey of service Discovery Architecture of MANET with AODV-SDA survey of service Discovery Architecture of MANET with AODV-SD
A survey of service Discovery Architecture of MANET with AODV-SD
 
Distributed computing
Distributed computingDistributed computing
Distributed computing
 
Cse rover-technology-report
Cse rover-technology-reportCse rover-technology-report
Cse rover-technology-report
 
IRJET- Pervasive Computing Service Discovery in Secure Framework Environment
IRJET- Pervasive Computing Service Discovery in Secure Framework EnvironmentIRJET- Pervasive Computing Service Discovery in Secure Framework Environment
IRJET- Pervasive Computing Service Discovery in Secure Framework Environment
 
A Converged Approach to Standards for Industrial Automation
A Converged Approach to Standards for Industrial AutomationA Converged Approach to Standards for Industrial Automation
A Converged Approach to Standards for Industrial Automation
 
e-suap cloud computing- English version
e-suap cloud computing- English versione-suap cloud computing- English version
e-suap cloud computing- English version
 
D sys ch-vvdp-unit-1
D sys ch-vvdp-unit-1D sys ch-vvdp-unit-1
D sys ch-vvdp-unit-1
 
A Study Mobile Computing
A Study   Mobile ComputingA Study   Mobile Computing
A Study Mobile Computing
 
Mobile Technology
Mobile TechnologyMobile Technology
Mobile Technology
 
Onubha brochure
Onubha brochureOnubha brochure
Onubha brochure
 
Middleware.pptx
Middleware.pptxMiddleware.pptx
Middleware.pptx
 
Pervasive computing
Pervasive computingPervasive computing
Pervasive computing
 
Quality Metrics In Ubiquitous Computing
Quality Metrics In Ubiquitous ComputingQuality Metrics In Ubiquitous Computing
Quality Metrics In Ubiquitous Computing
 
Live Matches , Streaming , Scores
Live Matches , Streaming , ScoresLive Matches , Streaming , Scores
Live Matches , Streaming , Scores
 
Mobile technology-Unit 1
Mobile technology-Unit 1Mobile technology-Unit 1
Mobile technology-Unit 1
 
Ambiences on the-fly usage of available resources through personal devices
Ambiences  on the-fly usage of available resources through personal devicesAmbiences  on the-fly usage of available resources through personal devices
Ambiences on the-fly usage of available resources through personal devices
 
Mobile agents in a distributed multimedia dabase system(synopsis)
Mobile agents in a distributed multimedia dabase system(synopsis)Mobile agents in a distributed multimedia dabase system(synopsis)
Mobile agents in a distributed multimedia dabase system(synopsis)
 
JAVA 2013 IEEE MOBILECOMPUTING PROJECT A scalable server architecture for mob...
JAVA 2013 IEEE MOBILECOMPUTING PROJECT A scalable server architecture for mob...JAVA 2013 IEEE MOBILECOMPUTING PROJECT A scalable server architecture for mob...
JAVA 2013 IEEE MOBILECOMPUTING PROJECT A scalable server architecture for mob...
 
A scalable server architecture for mobile presence services in social network...
A scalable server architecture for mobile presence services in social network...A scalable server architecture for mobile presence services in social network...
A scalable server architecture for mobile presence services in social network...
 

Recently uploaded

Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..
UiPathCommunity
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
Alex Pruden
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 

Recently uploaded (20)

Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 

Pervasive computing

  • 2. INTRODUCTION  An environment in which people interact with embedded (and mostly invisible) computers (processors) and in which networked devices are aware of their surroundings and peers and are able to provide services or use services from peers effectively. It is the ability to access information and software applications anytime and anywhere. It is also Known as:  Pervasive Computing  Ubiquitous Computing  Ambient Intelligence  Wearable Computing  Context Awareness
  • 4. OUR WORLD TODAY:  Devices increasingly more powerful.  Devices are also becoming smaller & cheaper.  People interact daily with hundreds of computing devices (many of them mobile):  Cars  Desktops/Laptops  Cell phones  PDAs  MP3 players  Transportation passes, etc.
  • 5. JUST NOW… Too bad they can’t talk to each other…
  • 7. GOALS OF PERVASIVE COMPUTING  As our lives are full of devices and gadgets with different functionalities and abilities, it is becoming harder to keep track of each one of them and use them efficiently and seamlessly. This is where the pervasive computing come is into the picture with the following goals:  Invisible technology  Integration of virtual and physical worlds  Throughout desks, rooms, buildings, and life  Take the data out of environment, leaving behind just an enhanced ability to act.  Devices and services communicating with each other without any human intervention or help.
  • 8. PERVASIVE COMPUTING APPLICATIONS  Always running and available.  Composed of collaborating parts spared over the network – distributed components.  Adapt to environments when the users/devices move – reconfigure to use available services.  Users are not aware of the computing embedded in the device – transparent interaction.  Information pursues the user rather than user pursues the information.
  • 9. SERVICE DISCOVERY  Goal – allow devices to advertise, discover, configure, and communicate with each other in a mobile network  Example – when a device is moving between networks, it needs to know what services are still available, will be available, and no longer available. It also needs to know how to contact to these services. Then, based on the resources, the device is able to perform its task and for that Service Discovery Protocols are used.  Service Discovery Protocols – protocol to facilitate association of devices that have services to offer or that need services  Enable interoperability  Communication between devices  Accommodate heterogeneity  Devices can be of different kind  Minimize administrative overhead  Increase usability  Simplified design time implementation
  • 10. SERVICE LOCATION PROTOCOL  A service discovery protocol for advertisement and discovery of network services.  Each service has a service type, which defines a collection of services with a common nature.  Each service has a name and a list of characteristics where each characteristic is defined by a attribute-value pairing and Service with the same service type have similar attributes but different values.  For a device to connect to a service, a Service Access Point (SAP) is needed which contains information about where and how to get the service and secondly the structure of SAP is defined by URLs of scheme service.
  • 11. CONT.  For the device to know if a service is what it needs, a Service Advertisement is needed which contains information describing a service including Service Type, the values of the attributes, and the Service Access Point.  Each device can be defined as an User Agent (UA) or a Service Agent (SA) where User Agents are consumers of service and Service Agents are providers of service.  (Optionally) there is also a Directory Agent (DA) that maintains service advertisements  Many other service discovery protocols are available for example Jini, Bluetooth, UPnP, Salutation, etc.  The protocols are usually compose of the service clients (UA), service providers (SA), and service directories (DA)
  • 13. CHALLENGES  Invisibility – disappearance of computing technology from users' consciousness; embedding/combining computing infrastructure with building infrastructure  Scalability – scalability of users, devices, density of interactions in a local area  Availability – access to software applications and information anytime and anywhere  Dynamic – users and devices are mobile, services are provided by collaborating distributed components  Heterogeneity – variety of hardware, software platforms, network protocols, service providers  Integration with people – personal privacy, user intentions, access control