pervasive computing

21
Pervasive Pervasive computing computing

Upload: alien-coders

Post on 06-May-2015

5.676 views

Category:

Technology


0 download

DESCRIPTION

presented by Nesha Rani M

TRANSCRIPT

Page 1: Pervasive Computing

Pervasive Pervasive computingcomputing

Page 2: Pervasive Computing

Advances in technology allow us to embed computing power into smaller and smaller devices. Ubiquitous computing explores the new possibilities afforded by the fusion of computers with everyday objects. This talk will take a brief look at the foundations of pervasive computing, and lots more….

Computers EverywherePervasive Computing

Page 3: Pervasive Computing

What is Pervasive Computing? Technology View Computers everywhere – embedded into

fridges, washing machines, door locks, cars, furniture, people.

intelligent environment Mobile portable computing devices Wireless communication – seamless

mobile/fixed

User View Invisible – implicit interaction with your

environment Augmenting human abilities in context of tasks

Ubiquitous = mobile computing + intelligentenvironment

Page 4: Pervasive Computing

DefinitionsPost-desktop model of human-computer

interaction in which information processing has been thoroughly integrated into everyday objects and activities.

Ubiquitous computing, or calm technology, is a paradigm shift where technology becomes

virtually invisible in our lives.

All models of ubiquitous computing share a vision of small, inexpensive, robust networked processing devices, distributed at all scales throughout everyday life.

Page 5: Pervasive Computing

Bill Gates home

Page 6: Pervasive Computing

Fictional Technologies in SPY KIDS

Page 7: Pervasive Computing

Intelligent EnvironmentLights, air conditioning, TV automatically switch on

and off when you enter or leave rooms.

Sit on your favourite chair and TV switches on to the program you usually watch at this time of the day.

Use communicator/pda for phone, remote control, keys payments, passport, health records, authenticator.

Route input from ‘virtual’ keyboard to nearest suitable display.

Automatic detection of new items to control and physical

layout in a room or office, using computer vision.

Page 8: Pervasive Computing

Mobile Computing Vision

Universal connectivity – anywhere, anytime

Accommodate heterogeneity of networks and communicators

Ubiquitous intelligent environment – embedded computers everywhere

Easy user interaction Context independent access to services +

context dependent informationImagine Having a SINGLE remote to control

all your Electronic Gadgets.

Page 9: Pervasive Computing

Essential Technologies for Pervasive Computing• Hardware

technologiesmicrocontrollers …(Wireless)

networkingSensors, actuatorsPowerPotentially:

entirely new technologies (optoelectronics)

• Software technologies

Operating environments

NetworkingMiddlewarePlatform

technologiesUser interfaces

Page 10: Pervasive Computing

Sentilla SoftwareSentilla Point- Java-Powered software

platform Contains - operating system, virtual

machine and system libraries.

Sentilla Work, - Eclipse-based IDEcreating simple and easy programs.

Sentilla Server, PC-class software that enables the pervasive computers in the network to connect to your enterprise infrastructure

Page 11: Pervasive Computing

Sentilla

Page 12: Pervasive Computing

Sentilla HardwareSentilla Mini core of pervasive

computing solution.Combining MSP430 microcontroller

with a TI/Chipcon CC2420 low-power wireless radio.

Design flexible and scalable.Mini pre-bundled with Sentilla Point

(the world’s only Java-compliant software platform for pervasive computers.)

Page 13: Pervasive Computing

Genre of product solutions

Energy management.Safety and security.Logistics and asset

management.

Page 14: Pervasive Computing

Sentilla Labs

Bite-sized versions of large-scale industry applications. Project refrigerator monitor.

Developer applications and prototype hardware.Project Motion DetectorUses a Radio Shack infrared detector to alert you when there's movement.

Fun applications. Project classic, Pong.

Page 15: Pervasive Computing

Challenge: Social IssuesControl: who watches the watchers, what

is being recorded, who has access and when

Security of informationPrivacy concernsTransparency of computer actions (or

lack thereof)Legal implications of enabling

technology

Page 16: Pervasive Computing

Make computers security “conscious”, minimise user intervention

Establish strong identity Goal: Cryptographically strong identity to

devices (endpoints) Means: Host Identity Protocol (HIP)

Assign and manage trust and authority Goal: Decentralised means for managing

authorisation Means: SPKI certificates

Page 17: Pervasive Computing

Public keys

Page 18: Pervasive Computing

Trust in pervasive computing environments

Page 19: Pervasive Computing

Yesterday's Computers Filled Rooms …

Page 20: Pervasive Computing

… So Will Tomorrow’s

Page 21: Pervasive Computing

References

• http://researchweb.watson.ibm.com/journal/sj/384/ark.html

• http://www.sentilla.com/• http://www.percom.org/• http://www.youtube.com/watch?v=KsKne-fw-X0• http://www.computer.org/portal/site/ieeecs/