introduction of pervasive computing .ppt

yerusalemsa 23 views 44 slides Oct 07, 2024
Slide 1
Slide 1 of 44
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15
Slide 16
16
Slide 17
17
Slide 18
18
Slide 19
19
Slide 20
20
Slide 21
21
Slide 22
22
Slide 23
23
Slide 24
24
Slide 25
25
Slide 26
26
Slide 27
27
Slide 28
28
Slide 29
29
Slide 30
30
Slide 31
31
Slide 32
32
Slide 33
33
Slide 34
34
Slide 35
35
Slide 36
36
Slide 37
37
Slide 38
38
Slide 39
39
Slide 40
40
Slide 41
41
Slide 42
42
Slide 43
43
Slide 44
44

About This Presentation

description about pervasive computing.


Slide Content

Introduction to pervasive computing
1

Computing: Trend
Size
Number
One Computer for Many
People
(Mainframe Computing)
One Computer for
One Person
(PC Computing)
Many Computer for One
Person
(Pervasive Computing)

Computing: Evolution




Centralized
Computing
Distributed
Computing
Mobile
Computing
Pervasive
Computing
  
Remote Communication
Fault Tolerance & availability
Remote Information Access
Mobile Networks
Mobile Information Access
Adaptive Applications
Context Awareness
Ad-hoc Networks
Smart Sensors & Devices
  
Research Problems
There are different flavors of Computing
Evolution depending on who is looking at it and
the viewing angle.

Pervasive Computing: Alternative Names
oUbiquitous Computing
oAmbient Computing
oIntelligent Computing
oInvisible Computing
oProactive computing
oAutonomic computing
oSentient computing

Pervasive Computing: Vision
Mark Weiser (1952–1999), XEROX PARC,
Computers in the 21 century, Scientific American,
1991.
“In the 21st century the technology revolution will move
into the everyday, the small and the invisible…
…The most profound technologies are those that
disappear. They weave themselves into the fabrics of
everyday life until they are indistinguishable from it.”

Pervasive Computing: What is it
about
According to Mark Weiser
Pervasive computing is about the invisible and
everywhere (every time) computing
Invisible: tiny, embedded, attachable…
Everywhere: wireless, dynamically configurable, remote
access, adapting, …
It is about making computers so embedded, so fitting,
so natural that we use them even without noticing their
presence and without thinking about them.

Pervasive Computing: Definitions
Pervasive computing refers to the use of computers in everyday
life, including PDAs, smart phones and other mobile devices. It also
refers to computers contained in common place objects such as
cars and appliances and implies that people are unaware of their
presence.
Pervasive computing is a paradigm shift where technology becomes
virtually invisible in our lives. Instead of having a desktop or laptop
machine, the technology we use will be embedded in our
environment.
Pervasive computing is the trend towards increasingly connected
computing devices in the environment, a trend being brought about
by a convergence of advanced electronics, wireless technologies
and the Internet. …….

Pervasive Computing: Why now?
Computing devices are becoming very tiny, sometimes
invisible, either mobile or embedded and exist in almost
any type of object imaginable.
Computing environment is becoming full of the
increasingly ubiquitous and interconnected computing
devices
Enhanced by a convergence of:
Advanced electronics (Moor’s low),
Wireless technologies,
And the Internet.

Goals of Pervasive Computing
Ultimate goal:
Invisible technology
Integration of virtual and physical worlds
Throughout desks, rooms, buildings, and life
Take the data out of environment, leaving behind just an
enhanced ability to act

Pervasive Computing: Environment

Pervasive Computing: Environment ...
The most precious resource in a computer system is no longer its processor, memory, disk, or
network, but what?
But rather human attention. The aim in Pervasive computing is, therefore:
minimizing distractions on users’ attention, and
creating environment that adapts to the user’s context and needs
Meetin
g
Hospital Driving
Office
Teaching
Devices ….. Services
Smart Phone, Car kits,
Wearable, PDAs, …
Phone Call, Email, Message,
News alert, …

Pervasive Computing: the future-Internet of things
Internet (past) when a user was
allowed only to uses content
Internet (present) a user is
allowed to also create content
(e.g. face book, wiki, …)
Internet (future) ?
Ability of any social network-able objects to deliver information or accept input
==>the phenomenon of “Internet of things”
IP for “Everything” with IPv6? “Things” will be allowed to create and use
content

Mobile and Pervasive Computing
Overlap of Mobile and Pervasive Computing with other Fields (by M. Satyanarayanan)

Mobile Computing
Mobile computing resulted from:
The appearance of laptop computers and wireless LANs in early 1990s led
to a research for building a distributed system with mobile clients.
Mobile computing is characterized by:
mobile networking (mobile IP, ad hoc protocols, …)
mobile information access (disconnected operation, bandwidth-
adaptive file access, …)
adaptive applications (trans-coding, adaptive resource management,
…).
energy saving (energy-aware adaptation, variable-speed processor
scheduling, energy-sensitive memory management, …).
location sensitivity (location sensing, location-aware system, …).

Mobile Computing …
Among the basic constraints in mobility are:
•unpredictable variation in network quality
•lowered trust and robustness of mobile elements
•limitations on local resources imposed by weight and size
constraints
•concern for battery power consumption

Pervasive Computing
Pervasive computing environment is saturated with computing
and communication capability, yet so gracefully integrated with
users that it becomes a ‘‘technology that disappears.’’
Since mobility is an integral part of everyday life, such a
technology must support mobility; otherwise, a user will be aware
of the technology by its absence when s/he moves.

Pervasive Computing …
Characterized by
Context Awareness
Invisibility
Ad-hoc Networks
Smart Spaces and Devices

Pervasive Computing …
Context Awareness
Context-aware computing is an environment in which
applications can discover and take advantage of users’
contextual information.
Users’ context consisting of attributes such as physical location,
physiological state (such as body temperature and heart rate),
emotional state (such as angry, distressed, or calm), personal
history, daily behavioral patterns, and so on.
Aims to achieve a distraction-free pervasive computing
environment.

Pervasive Computing …
Context-aware applications look at the who’s, where’s,
when’s and what’s of entities and use this information to
determine why the situation is occurring.
There are four primary types of context
Location
Identity
Activity
Time

Real Time Context Engine
World
Sensing
Feature Extraction
Modeling
Actions

Pervasive Computing …
Invisibility
According to Weiser, it is about a complete
disappearance of pervasive computing technology
from a user’s consciousness. In practice, a reasonable
approximation to this idea is minimal user distraction.
If a pervasive computing environment continuously
meets user expectations and present surprises rarely,
it allows the user to interact almost at a subconscious
level.

Pervasive Computing …
Ad-hoc Networks
A self-configuring (wireless) network of (mobile)
nodes without the presence of static infrastructure.
MANET (Mobile ad-hoc network) and WSN
(Wireless sensor network) are areas of interest.
Bluetooth, WiFi, Jini, PnP are among the potential
protocols and tools.

Pervasive Computing …
Smart space
A space may be an enclosed area such as a meeting
room or corridor, or it may be a well-defined open area
such as a university campus, a park, a stadium, etc.
By embedding computing infrastructure into a building
infrastructure, a smart space brings together two worlds
that have been disjoint.
“A highly integrated computing and sensory environment
that effectively reasons about the physical and user context
of the space to transparently act on human desires”

Pervasive Computing …
A simple example of this is the automatic adjustment of
heating, cooling and lighting levels in a room based on
occupant’s profile.
Attribute of smart spaces
UbiComp devices
Wireless Networks
Sensors
Reasoning Mechanism
To model, filter and manage the information
In addition to this devices must supporting user mobility
24

Pervasive Computing …
All devices in a smart space will contain some means of
performing computations and offer connectivity, they will
be attached to some kind of network.
The devices are envisioned to be concealed, perhaps
embedded in walls and furniture's.
To collect situational information, context awareness is a key
attribute of smart spaces provided by sensors.
25

Architecture of Pervasive Computing Systems
26

Infrastructure layer
We classify devices in the infrastructure layer into:
Computing devices: provide the capability of information
processing. Laptops, PDAs, and smartphones are examples of
computing devices.
Sensors and actuators: represent devices that can sense or mediate
between physical and virtual environments. Sensors collect
information such as temperature, location, humidity, light, sound,
and tension from the environment
Network devices: provide wired or wireless network access to
connect different devices together in a virtual environment. Wireless
technologies are Bluetooth, Wi-Fi, infrared, Zigbee, LTE, NFC, and
RFID.
27

Middleware Layer
Responsible for abstracting resources provided by underlying
heterogeneous devices and providing a unified interface for
high-level applications
Hides the complexity and heterogeneity of underlying
hardware and network platforms, eases the management of
system resources, and makes the execution of applications
more predictable
Efficient storage management and processing of raw data in
order to provide meaningful context information for high
level applications.
28

Middleware Layer…
There have been a number of pervasive middleware systems such as:
Gaia, Aura, PICO/SeSCo, CORTEX, Scenes
Functionality of the middleware layer;
Resource management, User tracking, Context management, Service
management, Data management, and Security.
Only Gaia provides user authentication and access control as security
mechanism.
Gaia, Aura, and CORTEX have context management, while
PICO/SeSCo does not.
29

Middleware Layer…
Resource Management
Pervasive applications require a seamless orchestration of a
large body of heterogeneous sensors, devices, components, and
services that may dynamically join or leave. To better support
these applications, pervasive middleware needs to efficiently
manage sensors and actuating devices, despite the diverse
functionality of underlying technologies and vendors.
Key functions of resource management include resource
registration, resource control, and resource abstraction.
30

Middleware Layer….
User Tracking
Pervasive applications need to adapt their behavior to moving
users. In order to do this, pervasive applications need an
efficient user tracking method that can identify user positions
and trails.
 Typical technologies for locating users’ positions can be for an
outdoor environment, a GPS is used for obtaining position
information and for Indoor location sensing uses many
wireless technologies, such as infrared, Bluetooth, RFID...
31

Middleware Layer …
Context management: It includes:-
Context acquisition: the process of collecting low level
information from various sensing sources
Context representation: Refers to a formal description of the
semantics of a context.
Context reasoning: the process of inferring high level implicit
context information from low level explicit context information.
32

Middleware Layer …
Data management
Provides permanent data storage for pervasive applications. For pervasive
applications, there are many mobile devices that are connected in a highly
dynamic and ad hoc manner. Data management must consider many issues,
such as frequent change of data sources in terms of location and time,
constant network disconnection among devices, and inconsistency of data
Service Management
Middleware often supports mechanisms for efficient service management,
including service registration, service discovery, service handoff, service
composition and service access.
Security and Reliability Management
Providing fault tolerance and security and privacy such as access control,
encryption, authentication security, etc.
33

Application Layer
Smart car, Smart home, Smart hospital, Smart agriculture …
E.g. Smart car space requires frequent information exchanges with
the outside environment. The vehicle needs local traffic information
in order to adaptively choose different routes. The vehicle is
installed with a touch screen, a GPS receiver, a video camera, and a
wireless router.
34

REAL TIME APPLICATIONS
Smart Transport
Smart Roadway
Reactive lights / Dynamic lanes
Road condition monitoring
Traffic management
Connect cars
Accident avoidance
Fleet management
Real time public transportation alert
35

REAL TIME APPLICATIONS
Smart Building
Security
Lighting
Energy Management
36

REAL TIME APPLICATIONS
SMART CLOTHING
►Conductive textiles and inks print electrically
active patterns directly onto fabrics.
►Sensors based on fabric monitor pulse, blood
pressure, body temperature.
►Invisible collar microphones
►Game console on the sleeve?

REAL TIME APPLICATIONS
INTERACTIVE FLEX POSTERS
Flexes that communicate with the person
automatically in a building and then provide
him the information about his office and the
venue of his meeting that his held.

PILL CAM
Miniature camera
Diagnostic device
It can be swallowed
Once swallowed it gives
the data about the functioning
of the vital organs in our body .
REAL TIME APPLICATIONS

Intelligent Research Project
IBM ‘s“smarter planet “
The project is about building a smarter
planet by including everyday case scenarios
like parking the car in a place by
communicating with another car.

41
1.Project Aura (Carnegie Mellon University )
2.Oxygen (MIT)
3.Portalano (University of Washington)
4.Endeavour(University of California at Berkeley)
5.Place Lab (Intel Research Laboratory at Seattle)
6.iSpace (at Stanford)
7.Cool Town (at HP Labs)
8.Easy Living (at Microsoft Research)
9.SPOT (at Microsoft Research)
10.Class Room (at Georgia Tech)
11.Smart Home (at Georgia Tech)
12.HomeLab (at Philips)
13.Hospital of the Future (at Aarhus University, Denmark)
Examples: Pervasive computing projects

Pervasive Computing …
Example Scenarios
What would it be like to live in a world with pervasive
computing? Let us look at a scenarios taken from Aura,
a pervasive computing system of the Aura project !

Scenario: Jane at the airport
Jane is at Gate 23 in the Pittsburgh airport, waiting for her connecting flight. She has edited
many large documents, and would like to use her wireless connection to e-mail them.
Unfortunately, bandwidth is miserable because many passengers at Gates 22 and 23 are
surfing the web.
Aura observes that at the current bandwidth Jane won’t be able to finish sending her
documents before her flight departs.
Consulting the airport’s network service and flight schedule service, Aura discovers that
wireless bandwidth is excellent at Gate 15, and that there are no departing or arriving flights
at nearby gates for half an hour.
A dialog box pops up on Jane’s screen suggesting that she go to Gate 15, which is only three
minutes away.
Jane accepts Aura’s advice and walks to Gate 15. She watches CNN on a TV until Aura
informs her that it is close to being done with her messages, and that she can start walking
back.
The last message is transmitted during her walk, and she is back at Gate 23 in time for her
boarding call.

Key elements: Scenario – Jane at the airport
User location sensors
Network traffic (at different gates)
Flight schedule
Map/distance (among the gates)
Monitoring (message transfer)
Communication among devices
Prediction/ Inference
Decision Support
Tags