SlideShare a Scribd company logo
1 of 28
CSN2506 Enterprise Computing 
Presentation 
Pervasive Computing 
Anshuman Biswal 
PT 2012 Batch, Reg. No.: CJB0412001 
M. Sc. (Engg.) in Computer Science and Networking 
Module Leader: Proff. Ami Rai E. 
Module Name: Enterprise Computing 
Module Code : CSN2506 
M. S. Ramaiah School of Advanced Studies 1
Presentation Outline 
• History of computing development 
• Trends in computing 
• Introduction 
• Evolution and related fields 
• Principles of pervasive computing 
• Some research thrusts 
• Design and implementation problems 
• Example projects 
• Some sample projects 
• Conclusion 
• References 
M. S. Ramaiah School of Advanced Studies 2
Marking 
Head Maximum Score 
Technical Content 05 
Grasp and Understanding 05 
Delivery – Technical and 
General Aspects 
05 
Handling Questions 05 
Total 20 
M. S. Ramaiah School of Advanced Studies 3
History of Computing Development-Energy Processing Era 
• Humans used own energy 
M. S. Ramaiah School of Advanced Studies 4 
Helped by animals 
Hand made device 
• Industrial revolution 
Energy was harnessed 
or generated (e.g. steam engines) 
Expanding human physical power 
In specific locations. 
• Energy decentralised 
Power station 
National Grid-distributed power 
Individual engines-mobility 
• Energy made pervasive 
Application driven devices 
Battery power 
Miniaturisation
History of Computing Development-Information Processing Era 
• Humans used own brain power 
Helped by paper and devices 
• Computer revolution 
Information was harnessed 
Expanding human mental power 
1940-Mainframe Era 
• Computing decentralised 
Bill gates ( early 1970’s) 
laptops and Pcs 
Personal computing era 
M. S. Ramaiah School of Advanced Studies 5 
• Pervasive computing 
Process data 
Store information 
Connect to other devices and/or internet 
Focus on the application 
Often portable,low power,connected 
1946: ENIAC: Electronic Numerical Integrator and Computer 
I think there is a 
world market for 
about five 
computers. 
A COMPUTER IN 
EVERY DESKTOP 
AND EVERY 
HOME 
Thomas J Watson 
Bill Gates
Trends in computing 
M. S. Ramaiah School of Advanced Studies 6 
• Mainframe 
Many people, one computer 
Fixed, central location 
• PC 
One person, one computer 
Fixed location, decentralised 
• Pervasive (Ubiquitous) 
One person, many computers 
Mobile
Introduction 
• Pervasive computing also known as Ubiquitous computing (ubicomp) is a concept 
in software engineering and computer science where computing is made to appear 
everywhere and anywhere. In contrast to desktop computing, ubiquitous computing can 
occur using any device, in any location, and in any format. A user interacts with the 
computer, which can exist in many different forms, including laptop computers, tablets and 
terminals in everyday objects such as a fridge or a pair of glasses. 
• It is also termed as ambient intelligence, Ubiquitous computing touches on a wide range of 
research topics, including distributed computing, mobile computing, location computing, 
mobile networking, context-aware computing, sensor networks, human-computer interaction, 
and artificial intelligence, everyware,physical computing, the Internet of Things, haptic 
computing, and 'things that think’. 
M. S. Ramaiah School of Advanced Studies 7
Introduction 
• Mark Weiser ( July 23, 1952- April 27,1999) was a chief scientist of 
Xerox PARC and widely considered to be the father of Ubiquotous 
computing (also known as Ubicomp) and calm technology. 
• Weiser authored more than 75 technical publications. 
• In addition to computer science, Weiser was also the drummer in the 
first band to perform live on the Internet, Severe Tire Damage. 
• “The most profound technologies are those that dissappear. They 
weave themselves into the fabric of everyday life until they are 
indistinguishable from it” [1] 
• The essence of that vision was the creation of environments saturated 
with computing and communication capability, yet gracefully 
integrated with human 
users. 
• When articulated, this was a vision too far ahead of its time the 
hardware technology needed to achieve it simply did not exist. Not 
surprisingly, the implementation attempted by Weiser and his 
colleagues at Xerox PARC fell short 
M. S. Ramaiah School of Advanced Studies 8
Evolution and related fields 
• Pervasive computing represents a major evolutionary step in a line of work dating back 
M. S. Ramaiah School of Advanced Studies 9 
to the mid-1970s. 
• Two distinct earlier steps in this evolution: 
Distributed systems 
Mobile computing
Evolution and related fields 
M. S. Ramaiah School of Advanced Studies 10 
• Distributed systems 
– Arose at the intersection of personal computers and local area networks. 
– The research that followed from the mid-1970s through the early 1990s created a 
conceptual framework and algorithmic base that has proven to be of enduring value 
in all work involving two or more computers connected by a network — whether 
mobile or static, wired or wireless, sparse or pervasive. 
– Spans many areas that are foundational to pervasive computing. 
• Mobile computing 
– The appearance of full-function laptop computers and wireless LANs in the early 
1990s led researchers to confront the problems that arise in building a distributed 
system with mobile clients. The field of mobile computing was thus born. 
– Many basic principles of distributed system design continued to apply. 
– Four key constraints of mobility forced the development of specialized techniques: 
• Unpredictable variation in network quality 
• Lowered trust and robustness of mobile elements 
• Limitations on local resources imposed by weight and size constraints 
• Concern for battery power consumption
Evolution and related fields 
M. S. Ramaiah School of Advanced Studies 11 
• Other related fields: 
– Sensor networks 
• A sensor network consist of a large number of tiny autonomous computing devices, each 
equipped with sensors, a wireless radio, a processor, and a power source. 
• Sensor networks are envisioned to be deployed unobtrusively in the physical environment 
in order to monitor a wide range of environmental phenomena (e.g., environmental 
pollutions, seismic activity, wildlife) with unprecedented quality and scale. 
– Human-computer interaction 
• HCI is the study of interaction between people (users) and computers. 
• A basic goal of HCI is to improve the interaction between users and computers by making 
computers more user-friendly and receptive to the user's needs. 
• A long term goal of HCI is to design systems that minimize the barrier between the 
human's cognitive model of what they want to accomplish and the computer's 
understanding of the user's task. 
– Artificial intelligence 
• AI can be defined as intelligence exhibited by an artificial (non-natural, manufactured) 
entity. 
• AI is studied in overlapping fields of computer science, psychology and engineering, 
dealing with intelligent behavior, learning and adaptation in machines, generally assumed 
to be computers. 
• Research in AI is concerned with producing machines to automate tasks requiring 
intelligent behavior.
Principles of pervasive computing 
• Laptop 
• Mobile phone 
• Games console 
• Palm/PDA 
M. S. Ramaiah School of Advanced Studies 12 
• Decentralization : 
Local or mobile devices 
Information is ‘networked’ 
• Connectivity : 
Data exchanged between devices 
Wireless connection /Internet 
• Diversification: 
Specialised tasks 
Internet access on 
• Simplicity : 
Seamless interfaces, intuitive, calm.
Principles of pervasive computing 
• Central aim of pervasive computing: invisibility 
– One does not need to continually rationalize one's use of a pervasive 
M. S. Ramaiah School of Advanced Studies 13 
computing system. 
– Having learnt about its use sufficiently well, one ceases to be aware of it. 
– It is "literally visible, effectively invisible" in the same way that a skilled 
carpenter engaged in his work might use a hammer without consciously 
planning each swing. 
– Similarly, when you look at a street sign, you absorb its information 
without consciously performing the act of reading.
Some research thrusts 
M. S. Ramaiah School of Advanced Studies 14 
• Effective Use of Smart Spaces : 
– By embedding computing infrastructure in building infrastructure, a smart space brings together 
two worlds that have been disjoint until now. 
– The fusion of these worlds enables sensing and control of one world by the other. 
• Automatic adjustment of heating, cooling, and lighting levels in a room based on an 
occupant’s electronic profile. 
• Invisibility: 
– The ideal expressed by Weiser is complete disappearance of pervasive computing technology 
from a user’s consciousness (minimal user distraction). 
– If a pervasive computing environment continuously meets user expectations and rarely presents 
him with surprises, it allows him to interact almost at a subconscious level.
Some research thrusts 
M. S. Ramaiah School of Advanced Studies 15 
• Localized scalability : 
– As smart spaces grow in sophistication, the intensity of interactions between a 
user’s personal computing space and his/her surroundings increases. 
– This has severe bandwidth, energy, and distraction implications for a wireless 
mobile user. 
– The presence of multiple users will further complicate this problem. 
– Good system design has to achieve scalability by severely reducing interactions 
between distant entities. 
• Masking uneven conditioning: 
– Huge differences in the “smartness” of different environments — what is available 
in a well-equipped conference room, office, or classroom may be more 
sophisticated than in other locations. 
– This large dynamic range of “smartness” can be jarring to a user, detracting from 
the goal of making pervasive computing technology invisible. 
– One way to reduce the amount of variation seen by a user is to have his/her 
personal computing space compensate for “dumb” environments.
Design and implementation problems 
• Design and implementation problems in pervasive comp. 
– User intent 
– Cyber foraging 
– Adaptation strategy 
– High-level energy management 
– Client thickness 
– Context awareness 
– Balancing proactivity and transparency 
– Impact on layering 
– Privacy and trust 
M. S. Ramaiah School of Advanced Studies 16
Design and implementation problems 
M. S. Ramaiah School of Advanced Studies 17 
• User intent 
– For proactivity to be effective, it is crucial that a pervasive computing system track 
user intent. Otherwise, it will be almost impossible to determine which system 
actions will help rather than hinder the user. 
– For example, suppose a user is viewing video over a network connection whose 
bandwidth suddenly drops. Should the system: 
• Reduce the fidelity of the video? 
• Pause briefly to find another higher-bandwidth connection? 
• Advise the user that the task can no longer be accomplished? 
– The correct choice will depend on what the user is trying to accomplish 
• Cyber foraging (also called “living off the land”) 
– The idea is to dynamically augment the computing resources of a wireless mobile 
computer by exploiting wired hardware infrastructure. 
– As computing becomes cheaper and more plentiful, it makes economic sense to 
“waste” computing resources to improve user experience. 
– In the forseeable future, public spaces such as airport lounges and coffee shops will 
be equipped with compute servers or data staging servers for the benefit of 
customers, much as table lamps are today. (Today, many shopping centers and 
cafeterias offer their customers free wireless internet access.)
Design and implementation problems 
M. S. Ramaiah School of Advanced Studies 18 
• Adaptation Strategy 
– Adaptation is necessary when there is a significant mismatch between the 
supply and demand of a resource (e.g. wireless network bandwidth, 
energy, computing cycles or memory). 
– There are three alternative strategies for adaptation in pervasive 
computing: 
• A client can guide applications in changing their behavior so that they 
use less of a scarce resource. This change usually reduces the user-perceived 
quality, or fidelity, of an application. 
• A client can ask the environment to guarantee a certain level of a 
resource (reservation-based QoS systems). From the viewpoint of the 
client, this effectively increases the supply of a scarce resource to 
meet the client’s demand. 
• A client can suggest a corrective action to the user. If the user acts on 
this suggestion, it is likely (but not certain) that resource supply will 
become adequate to meet demand.
Design and implementation problems 
• High-level energy management 
– Sophisticated capabilities such as proactivity and self-tuning increase the 
energy demand of software on a mobile computer in one’s personal 
computing space. 
– Making such computers lighter and more compact places severe 
restrictions on battery capacity, so the higher levels of the system must be 
involved in memory management. 
– One example is energy-aware memory management, where the operating 
system dynamically controls the amount of physical memory that has to 
be refreshed. 
– Another example is energy-aware adaptation, where individual 
applications switch to modes of operation with lower fidelity and energy 
demand under operating system control 
M. S. Ramaiah School of Advanced Studies 19
Design and implementation problems 
• Client thickness (hardware capabilities of the client) 
– For a given application, the minimum acceptable thickness of a client is 
determined by the worst-case environmental conditions under which the 
application must run satisfactorily. 
– A very thin client suffices if one can always count on high-bandwidth 
low-latency wireless communication to nearby computing infrastructure, 
and batteries can be recharged or replaced easily. 
– If there exists even a single location visited by a user where these 
assumptions do not hold, the client will have to be thick enough to 
compensate at that location. 
– This is especially true for interactive applications where crisp response is 
M. S. Ramaiah School of Advanced Studies 20 
important.
Design and implementation problems 
M. S. Ramaiah School of Advanced Studies 21 
• Context awareness 
– A pervasive computing system must be cognizant of its user’s state and 
surroundings, and must modify its behavior based on this information. 
– A user’s context can be quite rich, consisting of attributes such as physical 
location, physiological state (e.g., body temperature and heart rate), 
emotional state (e.g., angry, distraught, or calm), personal history, daily 
behavioral patterns, and so on. 
– If a human assistant were given such context, he or she would make 
decisions in a proactive fashion, anticipating user needs. 
– In making these decisions, the assistant would typically not disturb the 
user at inopportune moments except in an emergency. 
– A pervasive computing system should emulate such a human assistant
Design and implementation problems 
M. S. Ramaiah School of Advanced Studies 22 
• Privacy and trust 
– As a user becomes more dependent on a pervasive computing system, it 
becomes more knowledgeable about that user’s movements, behavior 
patterns and habits. 
– Exploiting this information is critical to successful proactivity and self-tuning 
(invisibility), but also may cause serious loss of privacy. 
– User must trust the infrastructure to a considerable extent and the 
infrastructure needs to be confident of the user’s identity and authorization 
level before responding to his/her requests. 
– It is a difficult challenge to establish this mutual trust in a manner that is 
minimally intrusive and thus preserves invisibility.
Example projects 
• Pervasive computing projects have emerged at major universities and in 
industry: 
– Project Aura (Carnegie Mellon University) 
– Oxygen (Massachusetts Institute of Technology) 
– Portalano (University of Washington) 
– Endeavour (University of California at Berkeley) 
– Place Lab (Intel Research Laboratory at Seattle) 
M. S. Ramaiah School of Advanced Studies 23
Some sample project 
• Buy drinks by Friday (1) 
– Take out the last can of soda 
– Swipe the can’s UPC label, which 
adds soda to your shopping list 
– Make a note that you need soda for 
the guests you are having over this 
weekend 
M. S. Ramaiah School of Advanced Studies 24
Some sample project 
• Buy drinks by Friday (2) 
– Approach a local supermarket 
– AutoPC informs you that you are near a 
M. S. Ramaiah School of Advanced Studies 25 
supermarket 
– Opportunistic reminder: “If it is 
convenient, stop by to buy drinks.”
• Buy drinks by Friday (3) 
- Friday rolls around and you have not 
M. S. Ramaiah School of Advanced Studies 26 
bought drinks 
- Deadline-based reminder sent to your 
pager 
Some sample project
Conclusion 
• Pervasive computing will be a fertile source of challenging research problems 
in computer systems for many years to come. 
• Solving these problems will require us to broaden our discourse on some 
topics, and to revisit long-standing design assumptions in others. We will also 
have to address research challenges in areas outside computer systems. These 
areas include human-computer interaction (especially multi-modal interactions 
and human-centric hardware designs), software agents (with specific relevance 
to high-level proactive behavior), and expert systems and artificial intelligence 
(particularly in the areas of decision making and planning). Capabilities from 
these areas will need to be integrated with the kinds of computer systems 
capabilities discussed in this paper. Pervasive computing will thus be the 
crucible in which many disjoint areas of research are fused. 
M. S. Ramaiah School of Advanced Studies 27
References 
[1] Andrew C. Huang, Presentation of “Pervasive Computing: What is it good for?”, August 1999 
[2] D.Saha, A.Mukherjee, “Pervasive Computing: A Paradigm for the 21st Century”, IEEE 
Computer Society, March 2003. 
[3] “Mark Weiser” [Online] Available from http://en.wikipedia.org/wiki/Mark_Weiser (Accessed: 31 
M. S. Ramaiah School of Advanced Studies 28 
October 2014) 
[4] M.Satyanarayanan, “Pervasive Computing: Vision and Challenges”, IEEE Personal 
Communications, August 2001. 
[5] Roberto Siagri, Presentation of "Computer you can eat or Portable, High-Performance Systems", 
Eurotech Spa, December 2004 
[6] Ubiquitous Computing [Online] Available from: 
http://en.wikipedia.org/wiki/Ubiquitous_computing (Accessed: 31 October 2014) 
[7] Weiser,M. The Computer for the 21st Century.Scientific American, Vol. 265 N.9, pp. 66- 
75,September,1991.

More Related Content

What's hot (20)

Pervasive computing
Pervasive computingPervasive computing
Pervasive computing
 
Fog Computing
Fog ComputingFog Computing
Fog Computing
 
Deep learning presentation
Deep learning presentationDeep learning presentation
Deep learning presentation
 
Fundamentals of Quantum Computing
Fundamentals of Quantum ComputingFundamentals of Quantum Computing
Fundamentals of Quantum Computing
 
Human Computer Interaction
Human Computer InteractionHuman Computer Interaction
Human Computer Interaction
 
Learning Methods in a Neural Network
Learning Methods in a Neural NetworkLearning Methods in a Neural Network
Learning Methods in a Neural Network
 
WSN IN IOT
WSN IN IOTWSN IN IOT
WSN IN IOT
 
Grid computing Seminar PPT
Grid computing Seminar PPTGrid computing Seminar PPT
Grid computing Seminar PPT
 
IOT - Design Principles of Connected Devices
IOT - Design Principles of Connected DevicesIOT - Design Principles of Connected Devices
IOT - Design Principles of Connected Devices
 
Computational Intelligence and Applications
Computational Intelligence and ApplicationsComputational Intelligence and Applications
Computational Intelligence and Applications
 
UBIQUITOUS COMPUTING - Mary M
UBIQUITOUS COMPUTING - Mary MUBIQUITOUS COMPUTING - Mary M
UBIQUITOUS COMPUTING - Mary M
 
Ambient intelligence
Ambient intelligenceAmbient intelligence
Ambient intelligence
 
Ambient intelligence (AmI)
 Ambient intelligence (AmI)  Ambient intelligence (AmI)
Ambient intelligence (AmI)
 
Pervasive Computing: Vision and Challenges
Pervasive Computing: Vision and ChallengesPervasive Computing: Vision and Challenges
Pervasive Computing: Vision and Challenges
 
Fuzzy expert system
Fuzzy expert systemFuzzy expert system
Fuzzy expert system
 
Quantum computing
Quantum computingQuantum computing
Quantum computing
 
High–Performance Computing
High–Performance ComputingHigh–Performance Computing
High–Performance Computing
 
Map Reduce
Map ReduceMap Reduce
Map Reduce
 
cluster computing
cluster computingcluster computing
cluster computing
 
Cloud Service Models
Cloud Service ModelsCloud Service Models
Cloud Service Models
 

Viewers also liked

Introduction to Ubiquitous Computing
Introduction to Ubiquitous ComputingIntroduction to Ubiquitous Computing
Introduction to Ubiquitous ComputingHoneyson Joseph
 
5.0 pervasive computing
5.0 pervasive computing5.0 pervasive computing
5.0 pervasive computingdsasd sddddwe
 
Pervasive and Persuasive Computing
Pervasive and Persuasive ComputingPervasive and Persuasive Computing
Pervasive and Persuasive Computingyahamid
 
Context Aware Paradigm for Pervasive Computing Environment
Context Aware Paradigm for Pervasive Computing EnvironmentContext Aware Paradigm for Pervasive Computing Environment
Context Aware Paradigm for Pervasive Computing EnvironmentUmar Mahmud
 
Vertical Fragmentation of Location Information to Enable Location Privacy in ...
Vertical Fragmentation of Location Information to Enable Location Privacy in ...Vertical Fragmentation of Location Information to Enable Location Privacy in ...
Vertical Fragmentation of Location Information to Enable Location Privacy in ...ijasa
 
AMD & Grid Technology Enabling Pervasive Computing
AMD & Grid Technology Enabling Pervasive ComputingAMD & Grid Technology Enabling Pervasive Computing
AMD & Grid Technology Enabling Pervasive ComputingQuentin Fennessy
 
Message Signaled Interrupts
Message Signaled InterruptsMessage Signaled Interrupts
Message Signaled InterruptsAnshuman Biswal
 
Bitcoin Seminar - Stockholm
Bitcoin Seminar - StockholmBitcoin Seminar - Stockholm
Bitcoin Seminar - StockholmRobin Teigland
 
Inside Bitcoins_AlanReiner
Inside Bitcoins_AlanReinerInside Bitcoins_AlanReiner
Inside Bitcoins_AlanReinerMediabistro
 
Pervasive computing
Pervasive computingPervasive computing
Pervasive computingKelly Zhang
 
Mobile Computing UNIT-6
Mobile Computing UNIT-6Mobile Computing UNIT-6
Mobile Computing UNIT-6Ramesh Babu
 
Security and privacy issues of pervasive computing
Security and privacy issues of pervasive computingSecurity and privacy issues of pervasive computing
Security and privacy issues of pervasive computingRam kumar
 
Wearable Technology: Separating Fact from Science Fiction
Wearable Technology: Separating Fact from Science FictionWearable Technology: Separating Fact from Science Fiction
Wearable Technology: Separating Fact from Science FictionJoshua Murdock
 
Wearable technology by Rahul Shakya
Wearable technology by Rahul ShakyaWearable technology by Rahul Shakya
Wearable technology by Rahul ShakyaRahul Shakya
 
Seminar Report On Bitcoin
Seminar Report On BitcoinSeminar Report On Bitcoin
Seminar Report On BitcoinTouroxy
 

Viewers also liked (20)

Introduction to Ubiquitous Computing
Introduction to Ubiquitous ComputingIntroduction to Ubiquitous Computing
Introduction to Ubiquitous Computing
 
5.0 pervasive computing
5.0 pervasive computing5.0 pervasive computing
5.0 pervasive computing
 
Pervasive and Persuasive Computing
Pervasive and Persuasive ComputingPervasive and Persuasive Computing
Pervasive and Persuasive Computing
 
Context Aware Paradigm for Pervasive Computing Environment
Context Aware Paradigm for Pervasive Computing EnvironmentContext Aware Paradigm for Pervasive Computing Environment
Context Aware Paradigm for Pervasive Computing Environment
 
Vertical Fragmentation of Location Information to Enable Location Privacy in ...
Vertical Fragmentation of Location Information to Enable Location Privacy in ...Vertical Fragmentation of Location Information to Enable Location Privacy in ...
Vertical Fragmentation of Location Information to Enable Location Privacy in ...
 
AMD & Grid Technology Enabling Pervasive Computing
AMD & Grid Technology Enabling Pervasive ComputingAMD & Grid Technology Enabling Pervasive Computing
AMD & Grid Technology Enabling Pervasive Computing
 
Message Signaled Interrupts
Message Signaled InterruptsMessage Signaled Interrupts
Message Signaled Interrupts
 
Bitcoin Seminar - Stockholm
Bitcoin Seminar - StockholmBitcoin Seminar - Stockholm
Bitcoin Seminar - Stockholm
 
Inside Bitcoins_AlanReiner
Inside Bitcoins_AlanReinerInside Bitcoins_AlanReiner
Inside Bitcoins_AlanReiner
 
Pervasive computing
Pervasive computingPervasive computing
Pervasive computing
 
Mobile Computing UNIT-6
Mobile Computing UNIT-6Mobile Computing UNIT-6
Mobile Computing UNIT-6
 
Security and privacy issues of pervasive computing
Security and privacy issues of pervasive computingSecurity and privacy issues of pervasive computing
Security and privacy issues of pervasive computing
 
Wearable Technology: Separating Fact from Science Fiction
Wearable Technology: Separating Fact from Science FictionWearable Technology: Separating Fact from Science Fiction
Wearable Technology: Separating Fact from Science Fiction
 
Observer Pattern
Observer PatternObserver Pattern
Observer Pattern
 
Wearable technology by Rahul Shakya
Wearable technology by Rahul ShakyaWearable technology by Rahul Shakya
Wearable technology by Rahul Shakya
 
Ubiquitous Computing
Ubiquitous ComputingUbiquitous Computing
Ubiquitous Computing
 
GSM & CDMA TECHNOL
GSM & CDMA TECHNOLGSM & CDMA TECHNOL
GSM & CDMA TECHNOL
 
Unit 6
Unit 6Unit 6
Unit 6
 
Fibonacci Heap
Fibonacci HeapFibonacci Heap
Fibonacci Heap
 
Seminar Report On Bitcoin
Seminar Report On BitcoinSeminar Report On Bitcoin
Seminar Report On Bitcoin
 

Similar to Pervasive Computing

_Cloud_Computing_Overview.pdf
_Cloud_Computing_Overview.pdf_Cloud_Computing_Overview.pdf
_Cloud_Computing_Overview.pdfTyStrk
 
Week 1 Lecture_1-5 CC_watermark.pdf
Week 1 Lecture_1-5 CC_watermark.pdfWeek 1 Lecture_1-5 CC_watermark.pdf
Week 1 Lecture_1-5 CC_watermark.pdfJohn422973
 
Week 1 lecture material cc
Week 1 lecture material ccWeek 1 lecture material cc
Week 1 lecture material ccAnkit Gupta
 
cloudcomputingdistributedcomputing-171208050503 (1).pdf
cloudcomputingdistributedcomputing-171208050503 (1).pdfcloudcomputingdistributedcomputing-171208050503 (1).pdf
cloudcomputingdistributedcomputing-171208050503 (1).pdfArchanaPandiyan
 
vssutcloud computing.pptx
vssutcloud computing.pptxvssutcloud computing.pptx
vssutcloud computing.pptxMunmunSaha7
 
Ubiquitous computing presentation
Ubiquitous computing presentationUbiquitous computing presentation
Ubiquitous computing presentationRameshkumar1829
 
COMPUTER APPLICATIONS Module 1 HPSY - Copy.pptx
COMPUTER APPLICATIONS Module 1 HPSY - Copy.pptxCOMPUTER APPLICATIONS Module 1 HPSY - Copy.pptx
COMPUTER APPLICATIONS Module 1 HPSY - Copy.pptxArti Parab Academics
 
Concepts of Distributed Computing & Cloud Computing
Concepts of Distributed Computing & Cloud Computing Concepts of Distributed Computing & Cloud Computing
Concepts of Distributed Computing & Cloud Computing Hitesh Kumar Markam
 
Ubiquitous computing 1.0
Ubiquitous computing 1.0Ubiquitous computing 1.0
Ubiquitous computing 1.0jan aljan
 
What is Computer Science
What is Computer ScienceWhat is Computer Science
What is Computer ScienceMarlouPadua1
 
CS8791 CLOUD COMPUTING_UNIT-I_FINAL_ppt (1).pptx
CS8791 CLOUD COMPUTING_UNIT-I_FINAL_ppt (1).pptxCS8791 CLOUD COMPUTING_UNIT-I_FINAL_ppt (1).pptx
CS8791 CLOUD COMPUTING_UNIT-I_FINAL_ppt (1).pptxMALATHYANANDAN
 
Distributed Computing system
Distributed Computing system Distributed Computing system
Distributed Computing system Sarvesh Meena
 
Ubiquitous computing
Ubiquitous computingUbiquitous computing
Ubiquitous computingPriti Punia
 
met11403-chapter1_sem2_2122.pdf
met11403-chapter1_sem2_2122.pdfmet11403-chapter1_sem2_2122.pdf
met11403-chapter1_sem2_2122.pdfSoonChinFhong
 
Towards Pervasive Computing Environments With Cloud Services
Towards Pervasive Computing Environments With Cloud ServicesTowards Pervasive Computing Environments With Cloud Services
Towards Pervasive Computing Environments With Cloud Servicesijsptm
 

Similar to Pervasive Computing (20)

_Cloud_Computing_Overview.pdf
_Cloud_Computing_Overview.pdf_Cloud_Computing_Overview.pdf
_Cloud_Computing_Overview.pdf
 
Week 1 Lecture_1-5 CC_watermark.pdf
Week 1 Lecture_1-5 CC_watermark.pdfWeek 1 Lecture_1-5 CC_watermark.pdf
Week 1 Lecture_1-5 CC_watermark.pdf
 
Week 1 lecture material cc
Week 1 lecture material ccWeek 1 lecture material cc
Week 1 lecture material cc
 
cloudcomputingdistributedcomputing-171208050503 (1).pdf
cloudcomputingdistributedcomputing-171208050503 (1).pdfcloudcomputingdistributedcomputing-171208050503 (1).pdf
cloudcomputingdistributedcomputing-171208050503 (1).pdf
 
Cloud Computing & Distributed Computing
Cloud Computing & Distributed ComputingCloud Computing & Distributed Computing
Cloud Computing & Distributed Computing
 
vssutcloud computing.pptx
vssutcloud computing.pptxvssutcloud computing.pptx
vssutcloud computing.pptx
 
Ubiquitous computing presentation
Ubiquitous computing presentationUbiquitous computing presentation
Ubiquitous computing presentation
 
PPIT Lecture 1
PPIT Lecture 1PPIT Lecture 1
PPIT Lecture 1
 
COMPUTER APPLICATIONS Module 1 HPSY - Copy.pptx
COMPUTER APPLICATIONS Module 1 HPSY - Copy.pptxCOMPUTER APPLICATIONS Module 1 HPSY - Copy.pptx
COMPUTER APPLICATIONS Module 1 HPSY - Copy.pptx
 
Awareness: Layman Seminar Slides
Awareness: Layman Seminar SlidesAwareness: Layman Seminar Slides
Awareness: Layman Seminar Slides
 
Concepts of Distributed Computing & Cloud Computing
Concepts of Distributed Computing & Cloud Computing Concepts of Distributed Computing & Cloud Computing
Concepts of Distributed Computing & Cloud Computing
 
Ubiquitous computing 1.0
Ubiquitous computing 1.0Ubiquitous computing 1.0
Ubiquitous computing 1.0
 
What is Computer Science
What is Computer ScienceWhat is Computer Science
What is Computer Science
 
CS8791 CLOUD COMPUTING_UNIT-I_FINAL_ppt (1).pptx
CS8791 CLOUD COMPUTING_UNIT-I_FINAL_ppt (1).pptxCS8791 CLOUD COMPUTING_UNIT-I_FINAL_ppt (1).pptx
CS8791 CLOUD COMPUTING_UNIT-I_FINAL_ppt (1).pptx
 
Mobile computin intro.pptx
Mobile computin intro.pptxMobile computin intro.pptx
Mobile computin intro.pptx
 
Distributed Computing system
Distributed Computing system Distributed Computing system
Distributed Computing system
 
Ubiquitous computing
Ubiquitous computingUbiquitous computing
Ubiquitous computing
 
met11403-chapter1_sem2_2122.pdf
met11403-chapter1_sem2_2122.pdfmet11403-chapter1_sem2_2122.pdf
met11403-chapter1_sem2_2122.pdf
 
Trends in distributed systems
Trends in distributed systemsTrends in distributed systems
Trends in distributed systems
 
Towards Pervasive Computing Environments With Cloud Services
Towards Pervasive Computing Environments With Cloud ServicesTowards Pervasive Computing Environments With Cloud Services
Towards Pervasive Computing Environments With Cloud Services
 

More from Anshuman Biswal

भक्ति वृक्षा – CHAPTER 1 (1).pptx
भक्ति वृक्षा – CHAPTER 1 (1).pptxभक्ति वृक्षा – CHAPTER 1 (1).pptx
भक्ति वृक्षा – CHAPTER 1 (1).pptxAnshuman Biswal
 
Wireless Networking Security
Wireless Networking SecurityWireless Networking Security
Wireless Networking SecurityAnshuman Biswal
 
Ir da in_linux_presentation
Ir da in_linux_presentationIr da in_linux_presentation
Ir da in_linux_presentationAnshuman Biswal
 
Bangalore gayatri pariwar gayatri ashwamedha mahayagya
Bangalore gayatri pariwar gayatri ashwamedha mahayagyaBangalore gayatri pariwar gayatri ashwamedha mahayagya
Bangalore gayatri pariwar gayatri ashwamedha mahayagyaAnshuman Biswal
 
Six Sigma and/For Software Engineering
Six Sigma and/For Software EngineeringSix Sigma and/For Software Engineering
Six Sigma and/For Software EngineeringAnshuman Biswal
 
Fast web development using groovy on grails
Fast web development using groovy on grailsFast web development using groovy on grails
Fast web development using groovy on grailsAnshuman Biswal
 

More from Anshuman Biswal (10)

भक्ति वृक्षा – CHAPTER 1 (1).pptx
भक्ति वृक्षा – CHAPTER 1 (1).pptxभक्ति वृक्षा – CHAPTER 1 (1).pptx
भक्ति वृक्षा – CHAPTER 1 (1).pptx
 
Wireless Networking Security
Wireless Networking SecurityWireless Networking Security
Wireless Networking Security
 
Undecidabality
UndecidabalityUndecidabality
Undecidabality
 
Turing Machine
Turing MachineTuring Machine
Turing Machine
 
Ir da in_linux_presentation
Ir da in_linux_presentationIr da in_linux_presentation
Ir da in_linux_presentation
 
Array Processor
Array ProcessorArray Processor
Array Processor
 
Bangalore gayatri pariwar gayatri ashwamedha mahayagya
Bangalore gayatri pariwar gayatri ashwamedha mahayagyaBangalore gayatri pariwar gayatri ashwamedha mahayagya
Bangalore gayatri pariwar gayatri ashwamedha mahayagya
 
Six Sigma and/For Software Engineering
Six Sigma and/For Software EngineeringSix Sigma and/For Software Engineering
Six Sigma and/For Software Engineering
 
SNMP
SNMPSNMP
SNMP
 
Fast web development using groovy on grails
Fast web development using groovy on grailsFast web development using groovy on grails
Fast web development using groovy on grails
 

Recently uploaded

Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 

Recently uploaded (20)

Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 

Pervasive Computing

  • 1. CSN2506 Enterprise Computing Presentation Pervasive Computing Anshuman Biswal PT 2012 Batch, Reg. No.: CJB0412001 M. Sc. (Engg.) in Computer Science and Networking Module Leader: Proff. Ami Rai E. Module Name: Enterprise Computing Module Code : CSN2506 M. S. Ramaiah School of Advanced Studies 1
  • 2. Presentation Outline • History of computing development • Trends in computing • Introduction • Evolution and related fields • Principles of pervasive computing • Some research thrusts • Design and implementation problems • Example projects • Some sample projects • Conclusion • References M. S. Ramaiah School of Advanced Studies 2
  • 3. Marking Head Maximum Score Technical Content 05 Grasp and Understanding 05 Delivery – Technical and General Aspects 05 Handling Questions 05 Total 20 M. S. Ramaiah School of Advanced Studies 3
  • 4. History of Computing Development-Energy Processing Era • Humans used own energy M. S. Ramaiah School of Advanced Studies 4 Helped by animals Hand made device • Industrial revolution Energy was harnessed or generated (e.g. steam engines) Expanding human physical power In specific locations. • Energy decentralised Power station National Grid-distributed power Individual engines-mobility • Energy made pervasive Application driven devices Battery power Miniaturisation
  • 5. History of Computing Development-Information Processing Era • Humans used own brain power Helped by paper and devices • Computer revolution Information was harnessed Expanding human mental power 1940-Mainframe Era • Computing decentralised Bill gates ( early 1970’s) laptops and Pcs Personal computing era M. S. Ramaiah School of Advanced Studies 5 • Pervasive computing Process data Store information Connect to other devices and/or internet Focus on the application Often portable,low power,connected 1946: ENIAC: Electronic Numerical Integrator and Computer I think there is a world market for about five computers. A COMPUTER IN EVERY DESKTOP AND EVERY HOME Thomas J Watson Bill Gates
  • 6. Trends in computing M. S. Ramaiah School of Advanced Studies 6 • Mainframe Many people, one computer Fixed, central location • PC One person, one computer Fixed location, decentralised • Pervasive (Ubiquitous) One person, many computers Mobile
  • 7. Introduction • Pervasive computing also known as Ubiquitous computing (ubicomp) is a concept in software engineering and computer science where computing is made to appear everywhere and anywhere. In contrast to desktop computing, ubiquitous computing can occur using any device, in any location, and in any format. A user interacts with the computer, which can exist in many different forms, including laptop computers, tablets and terminals in everyday objects such as a fridge or a pair of glasses. • It is also termed as ambient intelligence, Ubiquitous computing touches on a wide range of research topics, including distributed computing, mobile computing, location computing, mobile networking, context-aware computing, sensor networks, human-computer interaction, and artificial intelligence, everyware,physical computing, the Internet of Things, haptic computing, and 'things that think’. M. S. Ramaiah School of Advanced Studies 7
  • 8. Introduction • Mark Weiser ( July 23, 1952- April 27,1999) was a chief scientist of Xerox PARC and widely considered to be the father of Ubiquotous computing (also known as Ubicomp) and calm technology. • Weiser authored more than 75 technical publications. • In addition to computer science, Weiser was also the drummer in the first band to perform live on the Internet, Severe Tire Damage. • “The most profound technologies are those that dissappear. They weave themselves into the fabric of everyday life until they are indistinguishable from it” [1] • The essence of that vision was the creation of environments saturated with computing and communication capability, yet gracefully integrated with human users. • When articulated, this was a vision too far ahead of its time the hardware technology needed to achieve it simply did not exist. Not surprisingly, the implementation attempted by Weiser and his colleagues at Xerox PARC fell short M. S. Ramaiah School of Advanced Studies 8
  • 9. Evolution and related fields • Pervasive computing represents a major evolutionary step in a line of work dating back M. S. Ramaiah School of Advanced Studies 9 to the mid-1970s. • Two distinct earlier steps in this evolution: Distributed systems Mobile computing
  • 10. Evolution and related fields M. S. Ramaiah School of Advanced Studies 10 • Distributed systems – Arose at the intersection of personal computers and local area networks. – The research that followed from the mid-1970s through the early 1990s created a conceptual framework and algorithmic base that has proven to be of enduring value in all work involving two or more computers connected by a network — whether mobile or static, wired or wireless, sparse or pervasive. – Spans many areas that are foundational to pervasive computing. • Mobile computing – The appearance of full-function laptop computers and wireless LANs in the early 1990s led researchers to confront the problems that arise in building a distributed system with mobile clients. The field of mobile computing was thus born. – Many basic principles of distributed system design continued to apply. – Four key constraints of mobility forced the development of specialized techniques: • Unpredictable variation in network quality • Lowered trust and robustness of mobile elements • Limitations on local resources imposed by weight and size constraints • Concern for battery power consumption
  • 11. Evolution and related fields M. S. Ramaiah School of Advanced Studies 11 • Other related fields: – Sensor networks • A sensor network consist of a large number of tiny autonomous computing devices, each equipped with sensors, a wireless radio, a processor, and a power source. • Sensor networks are envisioned to be deployed unobtrusively in the physical environment in order to monitor a wide range of environmental phenomena (e.g., environmental pollutions, seismic activity, wildlife) with unprecedented quality and scale. – Human-computer interaction • HCI is the study of interaction between people (users) and computers. • A basic goal of HCI is to improve the interaction between users and computers by making computers more user-friendly and receptive to the user's needs. • A long term goal of HCI is to design systems that minimize the barrier between the human's cognitive model of what they want to accomplish and the computer's understanding of the user's task. – Artificial intelligence • AI can be defined as intelligence exhibited by an artificial (non-natural, manufactured) entity. • AI is studied in overlapping fields of computer science, psychology and engineering, dealing with intelligent behavior, learning and adaptation in machines, generally assumed to be computers. • Research in AI is concerned with producing machines to automate tasks requiring intelligent behavior.
  • 12. Principles of pervasive computing • Laptop • Mobile phone • Games console • Palm/PDA M. S. Ramaiah School of Advanced Studies 12 • Decentralization : Local or mobile devices Information is ‘networked’ • Connectivity : Data exchanged between devices Wireless connection /Internet • Diversification: Specialised tasks Internet access on • Simplicity : Seamless interfaces, intuitive, calm.
  • 13. Principles of pervasive computing • Central aim of pervasive computing: invisibility – One does not need to continually rationalize one's use of a pervasive M. S. Ramaiah School of Advanced Studies 13 computing system. – Having learnt about its use sufficiently well, one ceases to be aware of it. – It is "literally visible, effectively invisible" in the same way that a skilled carpenter engaged in his work might use a hammer without consciously planning each swing. – Similarly, when you look at a street sign, you absorb its information without consciously performing the act of reading.
  • 14. Some research thrusts M. S. Ramaiah School of Advanced Studies 14 • Effective Use of Smart Spaces : – By embedding computing infrastructure in building infrastructure, a smart space brings together two worlds that have been disjoint until now. – The fusion of these worlds enables sensing and control of one world by the other. • Automatic adjustment of heating, cooling, and lighting levels in a room based on an occupant’s electronic profile. • Invisibility: – The ideal expressed by Weiser is complete disappearance of pervasive computing technology from a user’s consciousness (minimal user distraction). – If a pervasive computing environment continuously meets user expectations and rarely presents him with surprises, it allows him to interact almost at a subconscious level.
  • 15. Some research thrusts M. S. Ramaiah School of Advanced Studies 15 • Localized scalability : – As smart spaces grow in sophistication, the intensity of interactions between a user’s personal computing space and his/her surroundings increases. – This has severe bandwidth, energy, and distraction implications for a wireless mobile user. – The presence of multiple users will further complicate this problem. – Good system design has to achieve scalability by severely reducing interactions between distant entities. • Masking uneven conditioning: – Huge differences in the “smartness” of different environments — what is available in a well-equipped conference room, office, or classroom may be more sophisticated than in other locations. – This large dynamic range of “smartness” can be jarring to a user, detracting from the goal of making pervasive computing technology invisible. – One way to reduce the amount of variation seen by a user is to have his/her personal computing space compensate for “dumb” environments.
  • 16. Design and implementation problems • Design and implementation problems in pervasive comp. – User intent – Cyber foraging – Adaptation strategy – High-level energy management – Client thickness – Context awareness – Balancing proactivity and transparency – Impact on layering – Privacy and trust M. S. Ramaiah School of Advanced Studies 16
  • 17. Design and implementation problems M. S. Ramaiah School of Advanced Studies 17 • User intent – For proactivity to be effective, it is crucial that a pervasive computing system track user intent. Otherwise, it will be almost impossible to determine which system actions will help rather than hinder the user. – For example, suppose a user is viewing video over a network connection whose bandwidth suddenly drops. Should the system: • Reduce the fidelity of the video? • Pause briefly to find another higher-bandwidth connection? • Advise the user that the task can no longer be accomplished? – The correct choice will depend on what the user is trying to accomplish • Cyber foraging (also called “living off the land”) – The idea is to dynamically augment the computing resources of a wireless mobile computer by exploiting wired hardware infrastructure. – As computing becomes cheaper and more plentiful, it makes economic sense to “waste” computing resources to improve user experience. – In the forseeable future, public spaces such as airport lounges and coffee shops will be equipped with compute servers or data staging servers for the benefit of customers, much as table lamps are today. (Today, many shopping centers and cafeterias offer their customers free wireless internet access.)
  • 18. Design and implementation problems M. S. Ramaiah School of Advanced Studies 18 • Adaptation Strategy – Adaptation is necessary when there is a significant mismatch between the supply and demand of a resource (e.g. wireless network bandwidth, energy, computing cycles or memory). – There are three alternative strategies for adaptation in pervasive computing: • A client can guide applications in changing their behavior so that they use less of a scarce resource. This change usually reduces the user-perceived quality, or fidelity, of an application. • A client can ask the environment to guarantee a certain level of a resource (reservation-based QoS systems). From the viewpoint of the client, this effectively increases the supply of a scarce resource to meet the client’s demand. • A client can suggest a corrective action to the user. If the user acts on this suggestion, it is likely (but not certain) that resource supply will become adequate to meet demand.
  • 19. Design and implementation problems • High-level energy management – Sophisticated capabilities such as proactivity and self-tuning increase the energy demand of software on a mobile computer in one’s personal computing space. – Making such computers lighter and more compact places severe restrictions on battery capacity, so the higher levels of the system must be involved in memory management. – One example is energy-aware memory management, where the operating system dynamically controls the amount of physical memory that has to be refreshed. – Another example is energy-aware adaptation, where individual applications switch to modes of operation with lower fidelity and energy demand under operating system control M. S. Ramaiah School of Advanced Studies 19
  • 20. Design and implementation problems • Client thickness (hardware capabilities of the client) – For a given application, the minimum acceptable thickness of a client is determined by the worst-case environmental conditions under which the application must run satisfactorily. – A very thin client suffices if one can always count on high-bandwidth low-latency wireless communication to nearby computing infrastructure, and batteries can be recharged or replaced easily. – If there exists even a single location visited by a user where these assumptions do not hold, the client will have to be thick enough to compensate at that location. – This is especially true for interactive applications where crisp response is M. S. Ramaiah School of Advanced Studies 20 important.
  • 21. Design and implementation problems M. S. Ramaiah School of Advanced Studies 21 • Context awareness – A pervasive computing system must be cognizant of its user’s state and surroundings, and must modify its behavior based on this information. – A user’s context can be quite rich, consisting of attributes such as physical location, physiological state (e.g., body temperature and heart rate), emotional state (e.g., angry, distraught, or calm), personal history, daily behavioral patterns, and so on. – If a human assistant were given such context, he or she would make decisions in a proactive fashion, anticipating user needs. – In making these decisions, the assistant would typically not disturb the user at inopportune moments except in an emergency. – A pervasive computing system should emulate such a human assistant
  • 22. Design and implementation problems M. S. Ramaiah School of Advanced Studies 22 • Privacy and trust – As a user becomes more dependent on a pervasive computing system, it becomes more knowledgeable about that user’s movements, behavior patterns and habits. – Exploiting this information is critical to successful proactivity and self-tuning (invisibility), but also may cause serious loss of privacy. – User must trust the infrastructure to a considerable extent and the infrastructure needs to be confident of the user’s identity and authorization level before responding to his/her requests. – It is a difficult challenge to establish this mutual trust in a manner that is minimally intrusive and thus preserves invisibility.
  • 23. Example projects • Pervasive computing projects have emerged at major universities and in industry: – Project Aura (Carnegie Mellon University) – Oxygen (Massachusetts Institute of Technology) – Portalano (University of Washington) – Endeavour (University of California at Berkeley) – Place Lab (Intel Research Laboratory at Seattle) M. S. Ramaiah School of Advanced Studies 23
  • 24. Some sample project • Buy drinks by Friday (1) – Take out the last can of soda – Swipe the can’s UPC label, which adds soda to your shopping list – Make a note that you need soda for the guests you are having over this weekend M. S. Ramaiah School of Advanced Studies 24
  • 25. Some sample project • Buy drinks by Friday (2) – Approach a local supermarket – AutoPC informs you that you are near a M. S. Ramaiah School of Advanced Studies 25 supermarket – Opportunistic reminder: “If it is convenient, stop by to buy drinks.”
  • 26. • Buy drinks by Friday (3) - Friday rolls around and you have not M. S. Ramaiah School of Advanced Studies 26 bought drinks - Deadline-based reminder sent to your pager Some sample project
  • 27. Conclusion • Pervasive computing will be a fertile source of challenging research problems in computer systems for many years to come. • Solving these problems will require us to broaden our discourse on some topics, and to revisit long-standing design assumptions in others. We will also have to address research challenges in areas outside computer systems. These areas include human-computer interaction (especially multi-modal interactions and human-centric hardware designs), software agents (with specific relevance to high-level proactive behavior), and expert systems and artificial intelligence (particularly in the areas of decision making and planning). Capabilities from these areas will need to be integrated with the kinds of computer systems capabilities discussed in this paper. Pervasive computing will thus be the crucible in which many disjoint areas of research are fused. M. S. Ramaiah School of Advanced Studies 27
  • 28. References [1] Andrew C. Huang, Presentation of “Pervasive Computing: What is it good for?”, August 1999 [2] D.Saha, A.Mukherjee, “Pervasive Computing: A Paradigm for the 21st Century”, IEEE Computer Society, March 2003. [3] “Mark Weiser” [Online] Available from http://en.wikipedia.org/wiki/Mark_Weiser (Accessed: 31 M. S. Ramaiah School of Advanced Studies 28 October 2014) [4] M.Satyanarayanan, “Pervasive Computing: Vision and Challenges”, IEEE Personal Communications, August 2001. [5] Roberto Siagri, Presentation of "Computer you can eat or Portable, High-Performance Systems", Eurotech Spa, December 2004 [6] Ubiquitous Computing [Online] Available from: http://en.wikipedia.org/wiki/Ubiquitous_computing (Accessed: 31 October 2014) [7] Weiser,M. The Computer for the 21st Century.Scientific American, Vol. 265 N.9, pp. 66- 75,September,1991.

Editor's Notes

  1. The most profound technologies are those that dissappear. They weave themselves into the fabric of everyday life until they are indistinguishable from it. So began Mark Weiser’s seminal 1991 paper that described his vision of ubiquitous computing, now also called pervasive computing. The essence of that vision was the creation of environments saturated with computing and communication capability, yet gracefully integrated with human users.
  2. DISTRIBUTED SYSTEMS The field of distributed systems arose at the intersection of personal computers and local area networks. The research that followed from the mid-1970s through the early 1990s created a conceptual framework and algorithmic base that has proven to be of enduring value in all work involving two or more computers connected by a network — whether mobile or static, wired or wireless, sparse or pervasive. Spans many areas that are foundational to pervasive computing: Remote communication, including protocol layering, remote procedure call [5], the use of timeouts, and the use of endto-end arguments in placement of functionality Fault tolerance, including atomic transactions, distributed and nested transactions, and two-phase commit High availability, including optimistic and pessimistic replica contro, mirrored execution, and optimistic recovery Remote information access, including caching, function shipping, distributed file systems, and distributed databases Security, including encryption-based mutual authentication and privacy. MOBILE COMPUTING The appearance of full-function laptop computers and wireless LANs in the early 1990s led researchers to confront the problems that arise in building a distributed system with mobile clients. The field of mobile computing was thus born. Many basic principles of distributed system design continued to apply. Four key constraints of mobility forced the development of specialized techniques: Unpredictable variation in network quality Lowered trust and robustness of mobile elements Limitations on local resources imposed by weight and size constraints Concern for battery power consumption Many research areas: Mobile networking, including Mobile IP, ad hoc protocols, and techniques for improving TCP performance in wireless networks Mobile information access, including disconnected operation, bandwidth-adaptive file access, and selective control of data consistency Support for adaptative applications, including transcoding by proxies and adaptive resource management System-level energy saving techniques, such as energy-aware adaptation, variable-speed processor scheduling, and energy-sensitive memory management Location sensitivity, including location sensing and location-aware system behavior
  3. Decentralization: The ability to use the applications and information on mobile devices and coordinate any updates with network based systems is called decentralization. All computing is done by basic, small devices that are unintelligent, yet communicate in an open community where the structure of connections changes dynamically. (The Hive concept) Connectivity : There is a strong demand towards connectivity. Various devices are integrated in an IT world without boundaries. Handheld computers interact with mobile phones through infrared waves (IR waves) to synchronize data over a wireless network. This idea is ” EVERYBODY’s SOFTWARE RUNNING ON EVERYBODY’s HARDWARE OVER EVERYBODY’s NETWORK”. Many latest standards like Bluetooth, WAP, have been created with necessary communication protocols as well as the physical connections. The internet has evolved to be the backbone of worldwide public and private networks. Dumb devices can produce powerful and intelligent behaviour, if multiple devices act in parallel linked by an underlying infrastructure eg. the Internet. Diversification:  Pervasive computing introduced diversification of devices from universal computer. Nowadays there are many new gadgets introduced with pervasive computing facility. The devices like WAP phones, touch screen phones, etc offer high functionality for a particular application. Applications are the integration of software and hardware. They are used for specific situation. One major challenge arising from the increasing diversity is how to manage the different capabilities of those various devices. Each delivery platform has its own functionality. Therefore it is difficult to provide common application. Devices are small and special purpose, supplying a few, or even just one type of information. Simplicity:Pervasive devices are much specialized devices. They perform the task for which they have been designed. We must never notice that it exists.  If people have to constantly tweak, adjust, enter data to manage the connections, then the hive will never become pervasive.  The standards need to be open, to be as non restrictive as possible, (O’Hara et al, 2008).
  4. Effective use of smart space: The first research thrust is the effective use of smart spaces. A space may be an enclosed area such as a meeting room or corridor,or it may be a well-defined open area such as a courtyard or a quadrangle. By embedding computing infrastructure in building infrastructure, a smart space brings together two worlds that have been disjoint until now [16]. The fusion of these worlds enables sensing and control of one world by the other. A simple example of this is the automatic adjustment of heating, cooling and lighting levels in a room based on an occupant’s electronic profile. Influence in the other direction is also possible — software on a user’s computer may behave differently depending on where the user is currently located. Smartness may also extend to individual objects, whether located in a smart space or not. Invisibility: The second thrust is invisibility. The ideal expressed by Weiser is complete disappearance of pervasive computing technology from a user’s conciousness. In practice, a reasonable approximation to this ideal is minimal user distraction. If a pervasive computing environment continuously meets user expectations and rarely presents him with surprises, it allows him to interact almost at a subconcious level [46]. At the same time, a modicum of anticipation may be essential to avoiding a large unpleasant surprise later — much as pain alerts a person to a potentially serious future problem in a normally-unnoticed body part.
  5. Localized scalability: The third research thrust is localized scalability. As smart spaces grow in sophistication, the intensity of interactions between a user’s personal computing space and his surroundings increases. This has severe bandwidth, energy and distraction implications for a wireless mobile user. The presence of multiple users will further complicate this problem. Scalability, in the broadest sense, is thus a critical problem in pervasive computing. Previous work on scalability has typically ignored physical distance — a web server or file server should handle as many clients as possible, regardless of whether they are located next door or across the country. The situation is very different in pervasive computing. Here, the density of interactions has to fall off as one moves away —otherwise both the user and his computing system will be overwhelmed by distant interactions that are of little relevance. Although a mobile user far from home will still generate some distant interactions with sites relevant to him, the preponderance of his interactions will be local. Like the inverse square laws of nature, good system design has to achieve scalability by severely reducing interactions between distant entities. This directly contradicts the current ethos of the Internet, which many believe heralds the ‘‘death of distance.’’ Masking uneven conditioning:The fourth thrust is the development of techniques for masking uneven conditioning of environments. The rate of penetration of pervasive computing technology into the infrastructure will vary considerably depending on many non-technical factors such as organizational structure, economics and business models. Uniform penetration, if it is ever achieved, is many years or decades away.In the interim, there will persist huge differences in the ‘‘smartness’’ of different environments — what is available in a well-equipped conference room, office, or classroom may be more sophisticated than in other locations. This large dynamic range of ‘‘smartness’’ can be jarring to a user, detracting from the goal of making pervasive computing technology invisible.One way to reduce the amount of variation seen by a user is to have his personal computing space compensate for ‘‘dumb’’ environments. As a trivial example, a system that is capable of disconnected operation is able to mask the absence of wireless coverage in its environment. Complete invisibility may be impossible, but reduced variability is well within our reach.
  6. User intent: For proactivity to be effective, it is crucial that a pervasive computing system track user intent. Otherwise, it will be almost impossible to determine which system actions will help rather than hinder the user. For example, suppose a user is viewing video over a network connection whose bandwidth suddenly drops. Should the system (a) reduce the fidelity of the video, (b) pause briefly to find another higher-bandwidth connection, or (c) advise the user that the task can no longer be accomplished? The correct choice will depend on what the user is trying to accomplish. Today’s systems are poor at capturing and exploiting user intent. On the one hand are generic applications that have no idea what the user is attempting to do, and can therefore offer little support for adaptation and proactivity. On the other hand are applications that try to anticipate user intent but do so very badly — gimmicks like the Microsoft ‘‘paperclip’’ are often more annoying than helpful. Cyber Foraging: The need to make mobile devices smaller, lighter and have longer battery life means that their computing capabilities have to be compromised. But meeting the ever-growing expectations of mobile users may require computing and data manipulation capabilities well beyond those of a lightweight mobile computer with long battery life. Reconciling these contradictory requirements is difficult. Cyber foraging, construed as ‘‘living off the land’’, may be an effective way to deal with this problem. The idea is to dynamically augment the computing resources of a wireless mobile computer by exploiting wired hardware infrastructure. As computing becomes cheaper and more plentiful, it makes economic sense to ‘‘waste’’ computing resources to improve user experience. Desktop computers at discount stores already sell today for a few hundred dollars, with prices continuing to drop. In the forseeable future, we envision public spaces such as airport lounges and coffee shops being equipped with compute servers or data staging servers for the benefit of customers, much as table lamps are today. These will be connected to the wired Internet through high-bandwidth networks. When hardware in the wired infrastructure plays this role, we call it a surrogate of the mobile computer it is temporarily assisting. We envision a typical scenario as follows. When a mobile computer enters a neighborhood, it first detects the presence of potential surrogates and negotiates their use. Communication with a surrogate is via short-range wireless peer-to-peer technology, with the surrogate serving as the mobile computer’s networking gateway to the Internet. When an intensive computation accessing a large volume of data has to be performed, the mobile computer ships the computation to the surrogate; the latter may cache data from the Internet on its local disk in performing the computation. Alternatively, the surrogate may have staged data ahead of time in anticipation of the user’s arrival in the neighborhood. In that case, the surrogate may perform computations on behalf of the mobile computer or merely service its cache misses with low latency by avoiding Internet delays. When the mobile computer leaves the neighborhood, its surrogate bindings are broken, and any data staged or cached on its behalf are discarded. Cyber foraging opens up many important research questions. Here are some examples: • How does one discover the presence of surrogates? Of the many proposed service discovery mechanisms such as JINI, UPnP, and BlueTooth proximity detection, which is best suited for this purpose? Can one build a discovery mechanism that subsumes all of them for greatest flexibility? • How does one establish an appropriate level of trust in a surrogate? What are useful levels of trust in practice? How applicable and useful is the concept of caching trust [29]? Can one amortize the cost of establishing trust across many surrogates in a neighborhood? • How is load balancing on surrogates done? Is surrogate allocation based on an admission control approach, or a best-effort approach? How relevant is previous work on load balancing on networks of workstations? • In typical situations, how much advance notice does a surrogate need to act as an effective staging server with minimal delay? Is this on the order of seconds, minutes or tens of minutes? What implications does this requirement have for the other components of a pervasive computing system? • What are the implications for scalability? How dense does the fixed infrastructure have to be to avoid overloads during periods of peak demand? • What is the system support needed to make surrogate use seamless and minimally intrusive for a user? Which are the components of this support that must be provided by the mobile client, and which by the infrastructure?