Computing: Trend
Size
Number
One Computer for Many
People
(Mainframe Computing)
One Computer for
One Person
(PC Computing)
Many Computer for One
Person
(Pervasive Computing)
Computing: Evolution
Centralized
Computing
Distributed
Computing
Mobile
Computing
Pervasive
Computing
Remote Communication
Fault Tolerance & availability
Remote Information Access
Mobile Networks
Mobile Information Access
Adaptive Applications
Context Awareness
Ad-hoc Networks
Smart Sensors & Devices
Research Problems
There are different flavors of Computing
Evolution depending on who is looking at it and
the viewing angle.
Pervasive Computing: Vision
Mark Weiser (1952–1999), XEROX PARC,
Computers in the 21 century, Scientific American,
1991.
“In the 21st century the technology revolution will move
into the everyday, the small and the invisible…
…The most profound technologies are those that
disappear. They weave themselves into the fabrics of
everyday life until they are indistinguishable from it.”
Pervasive Computing: What is it
about
According to Mark Weiser
Pervasive computing is about the invisible and
everywhere (every time) computing
Invisible: tiny, embedded, attachable…
Everywhere: wireless, dynamically configurable, remote
access, adapting, …
It is about making computers so embedded, so fitting,
so natural that we use them even without noticing their
presence and without thinking about them.
Pervasive Computing: Definitions
Pervasive computing refers to the use of computers in everyday
life, including PDAs, smart phones and other mobile devices. It also
refers to computers contained in common place objects such as
cars and appliances and implies that people are unaware of their
presence.
Pervasive computing is a paradigm shift where technology becomes
virtually invisible in our lives. Instead of having a desktop or laptop
machine, the technology we use will be embedded in our
environment.
Pervasive computing is the trend towards increasingly connected
computing devices in the environment, a trend being brought about
by a convergence of advanced electronics, wireless technologies
and the Internet. …….
Pervasive Computing: Why now?
Computing devices are becoming very tiny, sometimes
invisible, either mobile or embedded and exist in almost
any type of object imaginable.
Computing environment is becoming full of the
increasingly ubiquitous and interconnected computing
devices
Enhanced by a convergence of:
Advanced electronics (Moor’s low),
Wireless technologies,
And the Internet.
Goals of Pervasive Computing
Ultimate goal:
Invisible technology
Integration of virtual and physical worlds
Throughout desks, rooms, buildings, and life
Take the data out of environment, leaving behind just an
enhanced ability to act
Pervasive Computing: Environment
Pervasive Computing: Environment ...
The most precious resource in a computer system is no longer its processor, memory, disk, or
network, but what?
But rather human attention. The aim in Pervasive computing is, therefore:
minimizing distractions on users’ attention, and
creating environment that adapts to the user’s context and needs
Meetin
g
Hospital Driving
Office
Teaching
Devices ….. Services
Smart Phone, Car kits,
Wearable, PDAs, …
Phone Call, Email, Message,
News alert, …
Pervasive Computing: the future-Internet of things
Internet (past) when a user was
allowed only to uses content
Internet (present) a user is
allowed to also create content
(e.g. face book, wiki, …)
Internet (future) ?
Ability of any social network-able objects to deliver information or accept input
==>the phenomenon of “Internet of things”
IP for “Everything” with IPv6? “Things” will be allowed to create and use
content
Mobile and Pervasive Computing
Overlap of Mobile and Pervasive Computing with other Fields (by M. Satyanarayanan)
Mobile Computing
Mobile computing resulted from:
The appearance of laptop computers and wireless LANs in early 1990s led
to a research for building a distributed system with mobile clients.
Mobile computing is characterized by:
mobile networking (mobile IP, ad hoc protocols, …)
mobile information access (disconnected operation, bandwidth-
adaptive file access, …)
adaptive applications (trans-coding, adaptive resource management,
…).
energy saving (energy-aware adaptation, variable-speed processor
scheduling, energy-sensitive memory management, …).
location sensitivity (location sensing, location-aware system, …).
Mobile Computing …
Among the basic constraints in mobility are:
•unpredictable variation in network quality
•lowered trust and robustness of mobile elements
•limitations on local resources imposed by weight and size
constraints
•concern for battery power consumption
Pervasive Computing
Pervasive computing environment is saturated with computing
and communication capability, yet so gracefully integrated with
users that it becomes a ‘‘technology that disappears.’’
Since mobility is an integral part of everyday life, such a
technology must support mobility; otherwise, a user will be aware
of the technology by its absence when s/he moves.
Pervasive Computing …
Characterized by
Context Awareness
Invisibility
Ad-hoc Networks
Smart Spaces and Devices
Pervasive Computing …
Context Awareness
Context-aware computing is an environment in which
applications can discover and take advantage of users’
contextual information.
Users’ context consisting of attributes such as physical location,
physiological state (such as body temperature and heart rate),
emotional state (such as angry, distressed, or calm), personal
history, daily behavioral patterns, and so on.
Aims to achieve a distraction-free pervasive computing
environment.
Pervasive Computing …
Context-aware applications look at the who’s, where’s,
when’s and what’s of entities and use this information to
determine why the situation is occurring.
There are four primary types of context
Location
Identity
Activity
Time
Real Time Context Engine
World
Sensing
Feature Extraction
Modeling
Actions
Pervasive Computing …
Invisibility
According to Weiser, it is about a complete
disappearance of pervasive computing technology
from a user’s consciousness. In practice, a reasonable
approximation to this idea is minimal user distraction.
If a pervasive computing environment continuously
meets user expectations and present surprises rarely,
it allows the user to interact almost at a subconscious
level.
Pervasive Computing …
Ad-hoc Networks
A self-configuring (wireless) network of (mobile)
nodes without the presence of static infrastructure.
MANET (Mobile ad-hoc network) and WSN
(Wireless sensor network) are areas of interest.
Bluetooth, WiFi, Jini, PnP are among the potential
protocols and tools.
Pervasive Computing …
Smart space
A space may be an enclosed area such as a meeting
room or corridor, or it may be a well-defined open area
such as a university campus, a park, a stadium, etc.
By embedding computing infrastructure into a building
infrastructure, a smart space brings together two worlds
that have been disjoint.
“A highly integrated computing and sensory environment
that effectively reasons about the physical and user context
of the space to transparently act on human desires”
Pervasive Computing …
A simple example of this is the automatic adjustment of
heating, cooling and lighting levels in a room based on
occupant’s profile.
Attribute of smart spaces
UbiComp devices
Wireless Networks
Sensors
Reasoning Mechanism
To model, filter and manage the information
In addition to this devices must supporting user mobility
24
Pervasive Computing …
All devices in a smart space will contain some means of
performing computations and offer connectivity, they will
be attached to some kind of network.
The devices are envisioned to be concealed, perhaps
embedded in walls and furniture's.
To collect situational information, context awareness is a key
attribute of smart spaces provided by sensors.
25
Architecture of Pervasive Computing Systems
26
Infrastructure layer
We classify devices in the infrastructure layer into:
Computing devices: provide the capability of information
processing. Laptops, PDAs, and smartphones are examples of
computing devices.
Sensors and actuators: represent devices that can sense or mediate
between physical and virtual environments. Sensors collect
information such as temperature, location, humidity, light, sound,
and tension from the environment
Network devices: provide wired or wireless network access to
connect different devices together in a virtual environment. Wireless
technologies are Bluetooth, Wi-Fi, infrared, Zigbee, LTE, NFC, and
RFID.
27
Middleware Layer
Responsible for abstracting resources provided by underlying
heterogeneous devices and providing a unified interface for
high-level applications
Hides the complexity and heterogeneity of underlying
hardware and network platforms, eases the management of
system resources, and makes the execution of applications
more predictable
Efficient storage management and processing of raw data in
order to provide meaningful context information for high
level applications.
28
Middleware Layer…
There have been a number of pervasive middleware systems such as:
Gaia, Aura, PICO/SeSCo, CORTEX, Scenes
Functionality of the middleware layer;
Resource management, User tracking, Context management, Service
management, Data management, and Security.
Only Gaia provides user authentication and access control as security
mechanism.
Gaia, Aura, and CORTEX have context management, while
PICO/SeSCo does not.
29
Middleware Layer…
Resource Management
Pervasive applications require a seamless orchestration of a
large body of heterogeneous sensors, devices, components, and
services that may dynamically join or leave. To better support
these applications, pervasive middleware needs to efficiently
manage sensors and actuating devices, despite the diverse
functionality of underlying technologies and vendors.
Key functions of resource management include resource
registration, resource control, and resource abstraction.
30
Middleware Layer….
User Tracking
Pervasive applications need to adapt their behavior to moving
users. In order to do this, pervasive applications need an
efficient user tracking method that can identify user positions
and trails.
Typical technologies for locating users’ positions can be for an
outdoor environment, a GPS is used for obtaining position
information and for Indoor location sensing uses many
wireless technologies, such as infrared, Bluetooth, RFID...
31
Middleware Layer …
Context management: It includes:-
Context acquisition: the process of collecting low level
information from various sensing sources
Context representation: Refers to a formal description of the
semantics of a context.
Context reasoning: the process of inferring high level implicit
context information from low level explicit context information.
32
Middleware Layer …
Data management
Provides permanent data storage for pervasive applications. For pervasive
applications, there are many mobile devices that are connected in a highly
dynamic and ad hoc manner. Data management must consider many issues,
such as frequent change of data sources in terms of location and time,
constant network disconnection among devices, and inconsistency of data
Service Management
Middleware often supports mechanisms for efficient service management,
including service registration, service discovery, service handoff, service
composition and service access.
Security and Reliability Management
Providing fault tolerance and security and privacy such as access control,
encryption, authentication security, etc.
33
Application Layer
Smart car, Smart home, Smart hospital, Smart agriculture …
E.g. Smart car space requires frequent information exchanges with
the outside environment. The vehicle needs local traffic information
in order to adaptively choose different routes. The vehicle is
installed with a touch screen, a GPS receiver, a video camera, and a
wireless router.
34
REAL TIME APPLICATIONS
Smart Transport
Smart Roadway
Reactive lights / Dynamic lanes
Road condition monitoring
Traffic management
Connect cars
Accident avoidance
Fleet management
Real time public transportation alert
35
REAL TIME APPLICATIONS
Smart Building
Security
Lighting
Energy Management
36
REAL TIME APPLICATIONS
SMART CLOTHING
►Conductive textiles and inks print electrically
active patterns directly onto fabrics.
►Sensors based on fabric monitor pulse, blood
pressure, body temperature.
►Invisible collar microphones
►Game console on the sleeve?
REAL TIME APPLICATIONS
INTERACTIVE FLEX POSTERS
Flexes that communicate with the person
automatically in a building and then provide
him the information about his office and the
venue of his meeting that his held.
PILL CAM
Miniature camera
Diagnostic device
It can be swallowed
Once swallowed it gives
the data about the functioning
of the vital organs in our body .
REAL TIME APPLICATIONS
Intelligent Research Project
IBM ‘s“smarter planet “
The project is about building a smarter
planet by including everyday case scenarios
like parking the car in a place by
communicating with another car.
41
1.Project Aura (Carnegie Mellon University )
2.Oxygen (MIT)
3.Portalano (University of Washington)
4.Endeavour(University of California at Berkeley)
5.Place Lab (Intel Research Laboratory at Seattle)
6.iSpace (at Stanford)
7.Cool Town (at HP Labs)
8.Easy Living (at Microsoft Research)
9.SPOT (at Microsoft Research)
10.Class Room (at Georgia Tech)
11.Smart Home (at Georgia Tech)
12.HomeLab (at Philips)
13.Hospital of the Future (at Aarhus University, Denmark)
Examples: Pervasive computing projects
Pervasive Computing …
Example Scenarios
What would it be like to live in a world with pervasive
computing? Let us look at a scenarios taken from Aura,
a pervasive computing system of the Aura project !
Scenario: Jane at the airport
Jane is at Gate 23 in the Pittsburgh airport, waiting for her connecting flight. She has edited
many large documents, and would like to use her wireless connection to e-mail them.
Unfortunately, bandwidth is miserable because many passengers at Gates 22 and 23 are
surfing the web.
Aura observes that at the current bandwidth Jane won’t be able to finish sending her
documents before her flight departs.
Consulting the airport’s network service and flight schedule service, Aura discovers that
wireless bandwidth is excellent at Gate 15, and that there are no departing or arriving flights
at nearby gates for half an hour.
A dialog box pops up on Jane’s screen suggesting that she go to Gate 15, which is only three
minutes away.
Jane accepts Aura’s advice and walks to Gate 15. She watches CNN on a TV until Aura
informs her that it is close to being done with her messages, and that she can start walking
back.
The last message is transmitted during her walk, and she is back at Gate 23 in time for her
boarding call.
Key elements: Scenario – Jane at the airport
User location sensors
Network traffic (at different gates)
Flight schedule
Map/distance (among the gates)
Monitoring (message transfer)
Communication among devices
Prediction/ Inference
Decision Support