SlideShare a Scribd company logo
1 of 9
Pervasive Computing
What is pervasive computing?
Pervasive computing refers to embedding computers and
communication in our environment. The idea behind the
pervasive computing is to make the computing power disappear
in the environment, but will always be there whenever needed, it
means availability and invisibility. These invisible computers
won't have keyboards or screens, but will watch us, listen to us
and interact with us. Pervasive computing makes the computer
operate in the messy and unstructured world of real people and
real objects.
Pervasive Computing in short can be termed as
“Anything”, “Anytime", "Anywhere”
For example, a domestic pervasive computing
environment might interconnect lighting and
environmental controls with personal biometric
monitors woven into clothing so that illumination and
heating conditions in a room might be modulated
continuously.
HISTORY OF PERVASIVE COMPUTING
Pervasive computing is the third wave of computing
technologies to emerge since computers first appeared:
• First Wave - Mainframe computing era: one computer
shared by many people.
• Second Wave - Personal computing era: one computer
used by one person.
• Third Wave – Pervasive computing era: one person, many
computers. Millions of computers embedded in the
environment.
Four Principles of Pervasive Computing are:
– Decentralization
– Specialized services
– Connectivity
– Simplicity
Some Possible Applications:
Pervasive Computing involving Hybrid Internet works for:
Natural disaster-specific warning purposes like-
• Tsunami Warning
• Forest Fire Warning
• Volcanic Eruption Warning
• Flood Warning
Large-scale monitoring and tracking purposes like-
• Wildlife monitoring
• Baggage monitoring
• Intelligent Transportation Systems
• Wearable and Vehicular Computing
Advantages of Pervasive Computing:
 INVISIBLE: "Smart" environments will be embedded with computing
technologies that will be mostly out-of-sight.
 DECISION-MAKING: "Smart" environments will help occupants to make
choices about their everyday lives.
 INFORMATION PROCESSING: Architecture will go from crunching data to
making sense of data; therefore, eliminating our need to constantly input
adjustments.
 ENHANCING EXPERIENCE: As computers embed themselves in our
environments, sensors and actuators will create "smart" environments where
architectural space will be goal-oriented.
 CONVERGENCE: Much of our environment will be supplemented with
interconnected digital technologies. Such interconnectivity will allow for a new
type of "sharing" that will serve to eliminate many dull tasks.
Disadvantages of Pervasive Computing:
 Security issues
 Very expensive
 Slow and broken connections
Pervasive Computing Explained

More Related Content

What's hot

What's hot (20)

Pervasive computing
Pervasive computingPervasive computing
Pervasive computing
 
Introduction to Ubiquitous Computing
Introduction to Ubiquitous ComputingIntroduction to Ubiquitous Computing
Introduction to Ubiquitous Computing
 
Wearable Computer
Wearable ComputerWearable Computer
Wearable Computer
 
pervasive computing
pervasive computingpervasive computing
pervasive computing
 
Green Computing Seminar
Green Computing SeminarGreen Computing Seminar
Green Computing Seminar
 
Futex ppt
Futex  pptFutex  ppt
Futex ppt
 
Pervasive Computing
Pervasive ComputingPervasive Computing
Pervasive Computing
 
Ubiquitous computing
Ubiquitous computingUbiquitous computing
Ubiquitous computing
 
Pervasive Computing
Pervasive ComputingPervasive Computing
Pervasive Computing
 
Pervasive Computing
Pervasive ComputingPervasive Computing
Pervasive Computing
 
Ubiquitous Computing
Ubiquitous ComputingUbiquitous Computing
Ubiquitous Computing
 
Ambient Intelligence seminar report made by Shifali Jindal
Ambient Intelligence seminar report made by Shifali JindalAmbient Intelligence seminar report made by Shifali Jindal
Ambient Intelligence seminar report made by Shifali Jindal
 
Pervasive Computing - Let us Pervade our Future
Pervasive Computing - Let us Pervade our FuturePervasive Computing - Let us Pervade our Future
Pervasive Computing - Let us Pervade our Future
 
Ubiquitous Computing
Ubiquitous ComputingUbiquitous Computing
Ubiquitous Computing
 
Ambient intelligence
Ambient intelligenceAmbient intelligence
Ambient intelligence
 
Wearable Computing
Wearable ComputingWearable Computing
Wearable Computing
 
Introduction to IOT & Smart City
Introduction to IOT & Smart CityIntroduction to IOT & Smart City
Introduction to IOT & Smart City
 
Human computer Interaction
Human computer InteractionHuman computer Interaction
Human computer Interaction
 
Ambient Intelligence
Ambient IntelligenceAmbient Intelligence
Ambient Intelligence
 
Virtual keyboard seminar ppt
Virtual keyboard seminar pptVirtual keyboard seminar ppt
Virtual keyboard seminar ppt
 

Viewers also liked

Viewers also liked (8)

Internal memory
Internal memoryInternal memory
Internal memory
 
Computer assembler
Computer assemblerComputer assembler
Computer assembler
 
Process scheduling
Process schedulingProcess scheduling
Process scheduling
 
Virtual reality
Virtual realityVirtual reality
Virtual reality
 
Key management and distribution
Key management and distributionKey management and distribution
Key management and distribution
 
Hcl
HclHcl
Hcl
 
Project report-on-lakme
Project report-on-lakmeProject report-on-lakme
Project report-on-lakme
 
SlideShare 101
SlideShare 101SlideShare 101
SlideShare 101
 

Similar to Pervasive Computing Explained

pervasive-computing-09022014092937-pervasive-computing.ppt
pervasive-computing-09022014092937-pervasive-computing.pptpervasive-computing-09022014092937-pervasive-computing.ppt
pervasive-computing-09022014092937-pervasive-computing.pptRishabhRathore71
 
Ubiquitous computing
Ubiquitous computing Ubiquitous computing
Ubiquitous computing Govind Raj
 
Ubiquitous computing Paper
 Ubiquitous computing Paper Ubiquitous computing Paper
Ubiquitous computing PaperAssem mousa
 
Ubiqutous Computing
Ubiqutous ComputingUbiqutous Computing
Ubiqutous Computingdeaneal
 
Ubiquitous Computing: an Introduction
Ubiquitous Computing: an IntroductionUbiquitous Computing: an Introduction
Ubiquitous Computing: an IntroductionAlessandra Agostini
 
Ubiquitous computing abstract
Ubiquitous computing abstractUbiquitous computing abstract
Ubiquitous computing abstractPriti Punia
 
UBIQUITOUS COMPUTING - Mary M
UBIQUITOUS COMPUTING - Mary MUBIQUITOUS COMPUTING - Mary M
UBIQUITOUS COMPUTING - Mary MMary Margarat
 
Pervasivecomputing 140422034057-phpapp02
Pervasivecomputing 140422034057-phpapp02Pervasivecomputing 140422034057-phpapp02
Pervasivecomputing 140422034057-phpapp02Pravallika Reddy
 
Quality Metrics In Ubiquitous Computing
Quality Metrics In Ubiquitous ComputingQuality Metrics In Ubiquitous Computing
Quality Metrics In Ubiquitous ComputingRutvik Pensionwar
 
cloud of things Presentation
cloud of things Presentation cloud of things Presentation
cloud of things Presentation Assem mousa
 
Ubiquitous computing-and-its-privacy
Ubiquitous computing-and-its-privacyUbiquitous computing-and-its-privacy
Ubiquitous computing-and-its-privacyHatum Hussain
 
Ubiquitous computing-and-its-privacy
Ubiquitous computing-and-its-privacyUbiquitous computing-and-its-privacy
Ubiquitous computing-and-its-privacyHatum Hussain
 
EVALUATION & TRENDS OF SURVEILLANCE SYSTEM NETWORK IN UBIQUITOUS COMPUTING EN...
EVALUATION & TRENDS OF SURVEILLANCE SYSTEM NETWORK IN UBIQUITOUS COMPUTING EN...EVALUATION & TRENDS OF SURVEILLANCE SYSTEM NETWORK IN UBIQUITOUS COMPUTING EN...
EVALUATION & TRENDS OF SURVEILLANCE SYSTEM NETWORK IN UBIQUITOUS COMPUTING EN...Eswar Publications
 

Similar to Pervasive Computing Explained (20)

pervasive-computing-09022014092937-pervasive-computing.ppt
pervasive-computing-09022014092937-pervasive-computing.pptpervasive-computing-09022014092937-pervasive-computing.ppt
pervasive-computing-09022014092937-pervasive-computing.ppt
 
Ubiquitous Computing
Ubiquitous ComputingUbiquitous Computing
Ubiquitous Computing
 
Ubiquitous computing
Ubiquitous computing Ubiquitous computing
Ubiquitous computing
 
Ubiquitous computing Paper
 Ubiquitous computing Paper Ubiquitous computing Paper
Ubiquitous computing Paper
 
Introduction uc
Introduction ucIntroduction uc
Introduction uc
 
Ubiqutous Computing
Ubiqutous ComputingUbiqutous Computing
Ubiqutous Computing
 
Ubiquitous Computing: an Introduction
Ubiquitous Computing: an IntroductionUbiquitous Computing: an Introduction
Ubiquitous Computing: an Introduction
 
UBIQUITOUS COMPUTING
UBIQUITOUS COMPUTINGUBIQUITOUS COMPUTING
UBIQUITOUS COMPUTING
 
PERVASIVE COMPUTING
PERVASIVE COMPUTINGPERVASIVE COMPUTING
PERVASIVE COMPUTING
 
Ubiquitous computing abstract
Ubiquitous computing abstractUbiquitous computing abstract
Ubiquitous computing abstract
 
UBIQUITOUS COMPUTING - Mary M
UBIQUITOUS COMPUTING - Mary MUBIQUITOUS COMPUTING - Mary M
UBIQUITOUS COMPUTING - Mary M
 
Pervasivecomputing 140422034057-phpapp02
Pervasivecomputing 140422034057-phpapp02Pervasivecomputing 140422034057-phpapp02
Pervasivecomputing 140422034057-phpapp02
 
Quality Metrics In Ubiquitous Computing
Quality Metrics In Ubiquitous ComputingQuality Metrics In Ubiquitous Computing
Quality Metrics In Ubiquitous Computing
 
Ubiquitous computing
Ubiquitous computingUbiquitous computing
Ubiquitous computing
 
cloud of things Presentation
cloud of things Presentation cloud of things Presentation
cloud of things Presentation
 
Ubiquitous computing-and-its-privacy
Ubiquitous computing-and-its-privacyUbiquitous computing-and-its-privacy
Ubiquitous computing-and-its-privacy
 
Ubiquitous computing-and-its-privacy
Ubiquitous computing-and-its-privacyUbiquitous computing-and-its-privacy
Ubiquitous computing-and-its-privacy
 
Ubiquitous networking
Ubiquitous networkingUbiquitous networking
Ubiquitous networking
 
EVALUATION & TRENDS OF SURVEILLANCE SYSTEM NETWORK IN UBIQUITOUS COMPUTING EN...
EVALUATION & TRENDS OF SURVEILLANCE SYSTEM NETWORK IN UBIQUITOUS COMPUTING EN...EVALUATION & TRENDS OF SURVEILLANCE SYSTEM NETWORK IN UBIQUITOUS COMPUTING EN...
EVALUATION & TRENDS OF SURVEILLANCE SYSTEM NETWORK IN UBIQUITOUS COMPUTING EN...
 
Ambient Intelligence
Ambient IntelligenceAmbient Intelligence
Ambient Intelligence
 

Recently uploaded

Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvLewisJB
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Correctly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleCorrectly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleAlluxio, Inc.
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfROCENODodongVILLACER
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxKartikeyaDwivedi3
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEroselinkalist12
 
Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...121011101441
 
computer application and construction management
computer application and construction managementcomputer application and construction management
computer application and construction managementMariconPadriquez1
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)dollysharma2066
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsyncWhy does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsyncssuser2ae721
 
8251 universal synchronous asynchronous receiver transmitter
8251 universal synchronous asynchronous receiver transmitter8251 universal synchronous asynchronous receiver transmitter
8251 universal synchronous asynchronous receiver transmitterShivangiSharma879191
 

Recently uploaded (20)

Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvv
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
Correctly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleCorrectly Loading Incremental Data at Scale
Correctly Loading Incremental Data at Scale
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdf
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
 
Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...
 
computer application and construction management
computer application and construction managementcomputer application and construction management
computer application and construction management
 
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdfDesign and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsyncWhy does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
 
8251 universal synchronous asynchronous receiver transmitter
8251 universal synchronous asynchronous receiver transmitter8251 universal synchronous asynchronous receiver transmitter
8251 universal synchronous asynchronous receiver transmitter
 

Pervasive Computing Explained

  • 2. What is pervasive computing? Pervasive computing refers to embedding computers and communication in our environment. The idea behind the pervasive computing is to make the computing power disappear in the environment, but will always be there whenever needed, it means availability and invisibility. These invisible computers won't have keyboards or screens, but will watch us, listen to us and interact with us. Pervasive computing makes the computer operate in the messy and unstructured world of real people and real objects.
  • 3. Pervasive Computing in short can be termed as “Anything”, “Anytime", "Anywhere” For example, a domestic pervasive computing environment might interconnect lighting and environmental controls with personal biometric monitors woven into clothing so that illumination and heating conditions in a room might be modulated continuously.
  • 4. HISTORY OF PERVASIVE COMPUTING Pervasive computing is the third wave of computing technologies to emerge since computers first appeared: • First Wave - Mainframe computing era: one computer shared by many people. • Second Wave - Personal computing era: one computer used by one person. • Third Wave – Pervasive computing era: one person, many computers. Millions of computers embedded in the environment.
  • 5. Four Principles of Pervasive Computing are: – Decentralization – Specialized services – Connectivity – Simplicity
  • 6. Some Possible Applications: Pervasive Computing involving Hybrid Internet works for: Natural disaster-specific warning purposes like- • Tsunami Warning • Forest Fire Warning • Volcanic Eruption Warning • Flood Warning Large-scale monitoring and tracking purposes like- • Wildlife monitoring • Baggage monitoring • Intelligent Transportation Systems • Wearable and Vehicular Computing
  • 7. Advantages of Pervasive Computing:  INVISIBLE: "Smart" environments will be embedded with computing technologies that will be mostly out-of-sight.  DECISION-MAKING: "Smart" environments will help occupants to make choices about their everyday lives.  INFORMATION PROCESSING: Architecture will go from crunching data to making sense of data; therefore, eliminating our need to constantly input adjustments.  ENHANCING EXPERIENCE: As computers embed themselves in our environments, sensors and actuators will create "smart" environments where architectural space will be goal-oriented.  CONVERGENCE: Much of our environment will be supplemented with interconnected digital technologies. Such interconnectivity will allow for a new type of "sharing" that will serve to eliminate many dull tasks.
  • 8. Disadvantages of Pervasive Computing:  Security issues  Very expensive  Slow and broken connections