Post on 06-May-2015
Embed Size (px)
DESCRIPTIONpresented by Nesha Rani M
- 1.Pervasive computing
2. A dvances in technology allow us to embed computing power into smallerand smallerdevices. Ubiquitous computing explores the new possibilities afforded by the fusion of computers with everyday objects . T his talk willtakea brief look at the foundations ofpervasivecomputing,and lots more. ComputersE verywhere PervasiveComputing 3. What is Pervasive Computing?
- Technology View
- Computers everywhere embedded into fridges, washing machines, door locks, cars, furniture, people.
- intelligent environment
- Mobile portable computing devices
- Wireless communication seamless mobile/fixed
- User View
- Invisible implicit interaction with your environment
- Augmenting human abilities in context of tasks
- Ubiquitous = mobile computing + intelligent
- Post-desktop model of human-computer interaction in which information processing has been thoroughly integrated into everyday objects and activities.
- Ubiquitous computing, or calm technology, is a
- paradigm shift where technology becomes virtually
- invisible in our lives.
- All models of ubiquitous computing share a vision of small, inexpensive, robust networked processing devices, distributed at all scales throughout everyday life.
5. Bill Gates home 6. Fictional Technologies in SPY KIDS 7. Intelligent Environment
- Lights, air conditioning, TV automatically switch on and
- off when you enter or leave rooms.
- Sit on your favourite chair and TV switches on to the
- program you usually watch at this time of the day.
- Use communicator/pda for phone, remote control, keys
- payments, passport, health records, authenticator.
- Route input from virtual keyboard to nearest suitable
- Automatic detection of new items to control and physical
- layout in a room or office, using computer vision.
8. Mobile Computing Vision
- Universal connectivity anywhere, anytime
- Accommodate heterogeneity of networks and communicators
- Ubiquitous intelligent environment embedded computers everywhere
- Easy user interaction
- Context independent access to services + context dependent information
- Imagine Having a SINGLE remote to control all your Electronic Gadgets.
9. Essential Technologies for Pervasive Computing
- Hardware technologies
- (Wireless) networking
- Sensors, actuators
- Potentially: entirely new technologies (optoelectronics)
- Software technologies
- Operating environments
- Platform technologies
- User interfaces
10. Sentilla Software
- Sentilla Point -Java-Powered software platform
- C ontains-operating system, virtual machine and system libraries .
- Sentilla Work, - Eclipse-based IDE creating simple and easy programs.
- Sentilla Server, PC-class software that enables the pervasive computers in the network to connect to your enterprise infrastructure
11. Sentilla 12. Sentilla Hardware
- Sentilla Mini core ofpervasive computing solution .
- Combining MSP430 microcontroller with a TI/Chipcon CC2420 low-power wireless radio .
- Design flexibl eand scalabl e.
- Mini pre-bundled with Sentilla Point( the worlds only Java-compliant software platform for pervasive computers .)
13. Genre of product solutions
- Energy management.
- Safety and security.
- Logistics and asset management.
14. Sentilla Labs
- Bite-sized versions of large-scale industry applications.Project refrigerator monitor.
- Developer applications and prototype hardware.
- Project Motion Detector
- Uses a Radio Shack infrared detector to alert you when there's movement.
- Fun applications.
- Project classic,Pong.
15. Challenge: Social Issues
- Control: who watches the watchers, what is being recorded, who has access and when
- Security of information
- Privacy concerns
- Transparency of computer actions (or lack thereof)
- Legal implications of enabling technology
16. Make computers security conscious, minimise user intervention
- Establish strong identity
- Goal: Cryptographicallystrong identity to devices (endpoints)
- Means: Host Identity Protocol (HIP)
- Assign and manage trust and authority
- Goal:Decentralised means for managing authorisation
- Means: SPKI certificates
17. Public keys 18. Trust in pervasive computing environments 19. Yesterday'sComputers Filled Rooms 20. So Will Tomorrows 21. References