pervasive computing

Download Pervasive Computing

Post on 06-May-2015

5.663 views

Category:

Technology

0 download

Embed Size (px)

DESCRIPTION

presented by Nesha Rani M

TRANSCRIPT

  • 1.Pervasive computing

2. A dvances in technology allow us to embed computing power into smallerand smallerdevices. Ubiquitous computing explores the new possibilities afforded by the fusion of computers with everyday objects . T his talk willtakea brief look at the foundations ofpervasivecomputing,and lots more. ComputersE verywhere PervasiveComputing 3. What is Pervasive Computing?

  • Technology View
  • Computers everywhere embedded into fridges, washing machines, door locks, cars, furniture, people.
  • intelligent environment
  • Mobile portable computing devices
  • Wireless communication seamless mobile/fixed
  • User View
  • Invisible implicit interaction with your environment
  • Augmenting human abilities in context of tasks
  • Ubiquitous = mobile computing + intelligent
  • environment

4. Definitions

  • Post-desktop model of human-computer interaction in which information processing has been thoroughly integrated into everyday objects and activities.
  • Ubiquitous computing, or calm technology, is a
  • paradigm shift where technology becomes virtually
  • invisible in our lives.
  • All models of ubiquitous computing share a vision of small, inexpensive, robust networked processing devices, distributed at all scales throughout everyday life.

5. Bill Gates home 6. Fictional Technologies in SPY KIDS 7. Intelligent Environment

  • Lights, air conditioning, TV automatically switch on and
  • off when you enter or leave rooms.
  • Sit on your favourite chair and TV switches on to the
  • program you usually watch at this time of the day.
  • Use communicator/pda for phone, remote control, keys
  • payments, passport, health records, authenticator.
  • Route input from virtual keyboard to nearest suitable
  • display.
  • Automatic detection of new items to control and physical
  • layout in a room or office, using computer vision.

8. Mobile Computing Vision

  • Universal connectivity anywhere, anytime
  • Accommodate heterogeneity of networks and communicators
  • Ubiquitous intelligent environment embedded computers everywhere
  • Easy user interaction
  • Context independent access to services + context dependent information
  • Imagine Having a SINGLE remote to control all your Electronic Gadgets.

9. Essential Technologies for Pervasive Computing

  • Hardware technologies
    • microcontrollers
    • (Wireless) networking
    • Sensors, actuators
    • Power
    • Potentially: entirely new technologies (optoelectronics)
  • Software technologies
    • Operating environments
    • Networking
    • Middleware
    • Platform technologies
    • User interfaces

10. Sentilla Software

  • Sentilla Point -Java-Powered software platform
  • C ontains-operating system, virtual machine and system libraries .
  • Sentilla Work, - Eclipse-based IDE creating simple and easy programs.
  • Sentilla Server, PC-class software that enables the pervasive computers in the network to connect to your enterprise infrastructure

11. Sentilla 12. Sentilla Hardware

  • Sentilla Mini core ofpervasive computing solution .
  • Combining MSP430 microcontroller with a TI/Chipcon CC2420 low-power wireless radio .
  • Design flexibl eand scalabl e.
  • Mini pre-bundled with Sentilla Point( the worlds only Java-compliant software platform for pervasive computers .)

13. Genre of product solutions

  • Energy management.
  • Safety and security.
  • Logistics and asset management.

14. Sentilla Labs

  • Bite-sized versions of large-scale industry applications.Project refrigerator monitor.
  • Developer applications and prototype hardware.
  • Project Motion Detector
  • Uses a Radio Shack infrared detector to alert you when there's movement.
  • Fun applications.
  • Project classic,Pong.

15. Challenge: Social Issues

  • Control: who watches the watchers, what is being recorded, who has access and when
  • Security of information
  • Privacy concerns
  • Transparency of computer actions (or lack thereof)
  • Legal implications of enabling technology

16. Make computers security conscious, minimise user intervention

  • Establish strong identity
    • Goal: Cryptographicallystrong identity to devices (endpoints)
    • Means: Host Identity Protocol (HIP)
  • Assign and manage trust and authority
    • Goal:Decentralised means for managing authorisation
    • Means: SPKI certificates

17. Public keys 18. Trust in pervasive computing environments 19. Yesterday'sComputers Filled Rooms 20. So Will Tomorrows 21. References

  • http://researchweb.watson.ibm.com/journal/sj/384/ark.html
  • http://www.sentilla.com/
  • http://www.percom.org/
  • http://www.youtube.com/watch?v=KsKne-fw-X0
  • http://www.computer.org/portal/site/ieeecs/

Recommended

View more >