Está en la página 1de 11

1

PERVASIVE COMPUTING
--- FOR OUR INTELLIGENT DAILY LIFE

M. Haritha H.Priyanka SNIST CSE-3 1/4 9000605112

SNIST CSE-3 1/4 9951950748

PERVASIVE COMPUTING

ABSTRACT:
Isn't it interesting to have computers in your office logging you in as you are walking into the office? Isn't it interesting to have rooms greeting people by name, telephone calls being automatically forwarded to wherever the recipient may be? Isn't it interesting to have to have a house that won't need cleaning? Every surface will be dirt-repellent and antibacterial; and on the floors the vacuum cleaner is buzzing around all on its own. Isn't it interesting to have to have a house that will be capable of alerting its owner if it's in need of repair? Then, the owner can cheaply repair worn materials and avoid major, expensive repairs after the damage has been done. Isn't it interesting to have a car which itself helps you to find the parking spot? Isn't it interesting to have a house that will get hold of the plumber if you've got a leaky water pipe? Isn't it interesting to have a fridge that will alert us if we keep food approaching its expiry date? Then, the product can then be used at once, and we can avoid throwing away food. by name, telephone calls being automatically forwarded to wherever the recipient may be? All this is possible with what we call as PERVASIVE COMPUTING or UBIQUITOUS COMPUTING Pervasive computing is a vision of computing power invisibly embedded in the world around us and accessed through intelligent interfaces.Its highest ideal is to make a computer so embedded, so fitting, so natural, that we use it without even thinking about it. If achieved, such a vision would be transformational and have profound implications for how we live, work, interact and learn .This paper presents you an introduction to pervasive computing ,key elements of pervasive computing, what makes it unique ,research being carried out on it and its applications.

Computers become a part of our life INTRODUCTION:


The most profound technologies are those that disappear. They weave themselves into the fabric of everyday life until they are indistinguishable from it. -Mark Weiser

Mark Weiser is the first person to give an insight about the pervasive computing. The word pervasive means spread throughout. So pervasive computing is a scenario where we have computing integrated in the entire environment and it becomes an integral part of our life. Pervasive computing is about a shift to human centered computing, where technology is no longer a barrier, but works for us, adapting to our needs and preferences and remaining in the background until required. This implies a change in our relationship with ICT to a much more natural way of interacting

3
and using the power of networked computing systems which will be connected not just to the internet or other computers, but to places, people, everyday objects and things in the world around us.

WHAT IS PERVASIVE COMPUTING?


Pervasive computing is the trend towards increasingly ubiquitous (another name for the movement is ubiquitous computing), connected computing devices in the environment, a trend being brought about by a convergence of advanced electronic - and particularly, wireless technologies and the Internet. Pervasive computing devices are not personal computers as we tend to think of them, but very tiny - even invisible - devices, either mobile or embedded in almost any type of object imaginable, including cars, tools, appliances, clothing and various consumer goods - all communicating through increasingly interconnected networks.

Personal computers Third Wave Pervasive (initially called ubiquitous) computing era: one person, many computers. Millions of computers embedded in the environment, allowing technology to recede into the background.

EVOLUTION:
Pervasive computing is the third wave of computing technologies to emerge since computers first appeared: First Wave - Mainframe computing era: one computer shared by many people, via workstations.

The major trends in computing

KEY ELEMENTS OF PERVASIVE COMPUTING:


The key elements that devices/objects/nodes in a ubiquitous computing environment need are: identification, location, sensing and connectivity. IDENTIFICATION: In order for objects and devices to usefully become part of a wider intelligent, information sharing network ,it is vital that each one has a unique identity. This not only enables more things to be interconnected, it also means that objects that surround us can become resources and act as interfaces to other resources. Two

Mainframe computer Second Wave - Personal computing era: one computer used by one person, requiring a conscious interaction. Users largely bound to desktop.

4
important technologies used to provide identity are Radio Frequency Identification (RFID) tags and visual barcodes. RFID Radio Frequency Identification (RFID) is a type of auto identification system and refers to technologies that use radio waves to identify objects, locations or people The term rfid has become associated with a form of the technology called RFID tags. These are tiny microchips attached to antennae (transponders). The data on these chips can be read by a wireless reader (transceiver) and the data passed back to computer systems. There are two main types of RFID tags: passive (energy harvested from the reader) and active (with their own power supply). The more sophisticated tags offer read/write capabilities. level of intelligence ,resources and enables location based tools and services. Indeed location services are expected to be increasingly important over the next few years Devices and objects can establish their location in a variety of ways and to varying levels of accuracy. At a basic level an RFID tag can be recognised as it passes a fixed wireless reader. Devices with accelerometers can detect motion and know their orientation. Wi-Fi enable devices can be tracked to a reasonable degree of accuracy SENSOR NETWORKS: Attaching sensors to RFID tags or other wireless nodes enables much more information to be gathered and analysed as well as adding more awareness to ubiquitous networks. This awareness means that the network can detect and respond to the environment, often without any human interaction. Typically sensors can measure things like pressure, temperature, speed, air/water quality, stress, humidity, or acceleration.Wireless sensors consist of sensor(s) connected to micro-controllers, memory, batteries and radios. Each wireless sensor node usually forms part of peer to peer, mesh network (routing data through other nodes)that is selfconfiguring and has inbuilt redundancy. These autonomous networks are very scaleable and flexible, allowing self-discovery of new nodes and can cover large areas without the need for extensive fixed infrastructure. Sensor networks can now be deployed very quickly and can use web services to integrate with other IT systems. Many sensor networks require little power and could potentially be deployed for a number of years. MEMS:

RFID tag RFID chips can be as small as 0.05 mm2 and can be embedded in paper bar code simpler way of giving an object an identity and allowing a user to interact with it is through a visual or 2D barcode. These are printed pictures containing data, which when photographed by cameraphone will provide information about the object. The drawback of visual bar codes is that they are not wirelessly linked, so rely on explicit user interaction rather than the automatic, implicit use that is the real vision of ubiquitous computing.

Technologies that help in identification LOCATION: The ability of objects and devices to have location information adds another important

MEMS Micro Electro-mechanical Systems (MEMS) are moving parts on chips that are used to sense the environment and potentially to initiate an action, allowing systems to respond to the real world

5
around them. For example these are already used in cars to detect collisions and deploy airbags. Inertia sensors have been embedded in some mobile phones and games controllers to allow users to interact with the device through Movement. MOTES/SMART DUST: A development of sensor networks variously known as motes, smart dust, and speckles, involves extremely small sensor nodes, potentially the size of a grain of rice. These smart dust networks are very robust and can be scattered or sprayed into an environment or on an object. These systems are still very much in development, but are being researched by various organizations around the world CONNECTIVITY: Pervasive computing systems will rely on the interlinking of independent electronic devices into broader networks. This can be achieved via both wired (such as Broadband (ADSL) or Ethernet) and wireless networking technologies (such as WiFi or Bluetooth), with the devices themselves being capable of assessing the most effective form of connectivity in any given scenario. User interfaces represent the point of contact between ICT and human users. For example with a personal computer, the mouse and keyboard are used to input information, while the monitor usually provides the output. With PCS, new user interfaces are being developed that will be capable of sensing and supplying more information about users, and the broader environment, to the computer for processing. With future user interfaces the input might be visual information for example recognizing a persons face, or responding to gestures. It might also be based on sound, scent or touch recognition, or other sensory information like temperature. The output might also be in any of these formats. The technology could know the user (for example through expressed preferences, attitudes, behaviours) and tailor the physical environment to meet specific needs and demands. However, designing systems which can adapt to unforeseen situations presents considerable engineering challenges. There is debate over the degree of control users will have over future pervasive computing user interfaces as the technology develops. Three very different forms of human-computer interaction are postulated: active, passive and coercive . ACTIVE: Users could have overt control over pervasive computing technologies and devices in the environment. This could be achieved through language-based interfaces ,allowing users to issue direct spoken or written commands. Digital companions (possibly in the form of smart phones and PDAs) could act as personal, wireless control units for the intelligent environment (activating a home central heating system prior to returning from holiday, for example). PASSIVE: Pervasive computing could disappear into the background. People would no longer know they were interacting with computers. The technology would sense and respond to human activity, behaviour and demands intuitively and intelligently (for example, lighting altering in reaction to users location, mood and activity).

Wireless technologies are used The effective development of pervasive computing systems depends on their degree of interoperability, as well as on the convergence of standards for wired and wireless technologies.

6
currently located. Smartness may also extend to individual objects, whether located in a smart space or not. INVISIBILITY:

Connectivity is a key element of pervasive computing COERCIVE: Pervasive computing could control, overtly or covertly, lives and environments . Decisions made by developers development errors, unintended device interactions and malicious interference could all lead to loss of user control, and could possibly have negative implications for users.

The second thrust is invisibility. The ideal expressed by Weiser is complete disappearance of pervasive computing technology from a users conciousness. In practice, a reasonable approximation to this ideal is minimal user distraction. If a pervasive computing environment continuously meets user expectations and rarely presents him with surprises, it allows him to interact almost at subconscious level. At the same time, a modicum of anticipation may be essential to avoiding a large unpleasant surprise later much as pain alerts a person to a potential serious future problem in a normally-unnoticed body part.

WHAT MAKES PERVASIVE COMPUTING UNIQUE?


EFFECTIVE USE OF SMART SPACES:

The first research thrust is the effective use of smart spaces. A space may be an enclosed area such as a meeting room or corridor, or it may be a well-defined open area such as a courtyard or a quadrangle. By embedding computing infrastructure in building infrastructure, a smart space brings together two worlds that have been disjoint until now. The fusion of these worlds enables sensing and control of one world by the other. A simple example of this is the automatic adjustment of heating, cooling and lighting levels in a room based on an occupants electronic profile. Influence in the other direction is also possible software on a users computer may behave differently depending on where the user is

Computers gets invisibly embedded into objects LOCALIZED SCALABILITY: The third research thrust is localized scalability. As smart spaces grow in sophistication, the intensity of interactions between a users personal computing space and his surroundings increases. This has severe bandwidth, energy and distraction implications for a wireless mobile user. The presence of multiple users will further complicate this problem. Scalability, in the broadest sense, is thus a critical problem in pervasive computing. Previous work on

7
scalability has typically ignored physical distance a web server or file server should handle as many clients as possible, regardless of whether they are located next door or across the country. The situation is very different in pervasive computing. Here, the density of interactions has to fall off as one moves away otherwise both the user and his computing system will be overwhelmed by distant interactions that are of little relevance. Although a mobile user far from home will still generate some distant interactions with sites relevant to him, the preponderance of his interactions will be local. Like the inverse square laws of nature, good system design has to achieve scalability by severely reducing interactions between distant entities. This directly contradicts the current ethos of the Internet, which many believe heralds the death of distance. MASKING UNEVEN CONDITIONS:

RESEARCH BEING CARRIED OUT:

Logo of pervasive computing The Next Wave Technologies and Markets Program was a government initiative launched in 2001. It was established as a virtual interdisciplinary research collaboration dedicated to developing pervasive computing technologies and establishing potential markets. Seven projects have been funded through this initiative, including PCS applications in health care, domiciliary care, integrated home environments, cities/buildings and environmental sensing. IBM's project Planet Blue, for example, is largely focused on finding ways to integrate existing technologies with a wireless infrastructure. Carnegie Mellon University's Human Computer Interaction Institute (HCII) is working on similar research in their Project Aura, whose stated goal is "to provide each user with an invisible halo of computing and information services that persists regardless of location." The Massachusetts Institute of Technology (MIT) has a project called Oxygen. MIT named their project after that substance because they envision a future of ubiquitous computing devices as freely available and easily accessible as oxygen is today.

The fourth thrust is the development of techniques for masking uneven conditioning of environments. The rate of penetration of pervasive computing technology into the infrastructure will vary considerably depending on many non-technical factors such as organizational structure, economics and business models. Uniform penetration, if it is ever achieved, is many years or decades away. In the interim, there will persist huge differences in the smartness of different environments what is available in a well-equipped conference room, office, or classroom may be more sophisticated than in other locations. This large dynamic range of smartness can be jarring to a user, detracting from the goal of making pervasive computing technology invisible. One way to reduce the amount of variation seen by a user is to have his personal computing space compensate for dumb environments. As a trivial example, a system that is capable of disconnected operation is able to mask the absence of wireless coverage in its environment. Complete invisibility may be impossible, but reduced variability is well within our reach

Project AURA

APPLICATIONS:
HEALTHCARE:

Pervasive computing offers opportunities for future healthcare provision in the UK, both for treating and managing disease, and for patient administration. For instance, remote sensors and monitoring technology might allow the continuous capture and analysis of patients physiological data. Medical staff could be immediately alerted to any detected irregularities. Data collection on this scale could also provide for more accurate pattern/trend analysis of long-term conditions such as heart disease, diabetes and epilepsy. Hospital administration could also be transformed. Patients might be tagged with wristbands containing digital photographs and medical notes. These wristbands would allow patients to be traced more effectively through hospital administration systems, reducing the risk of misidentification and treatment errors

DOMICILIARY CARE: Over the next 20 years there will be a rise in the proportion of people over 65 years old in most developed countries. In the UK the over-65s will increase from 20% to 40% of the total population by 2025. These people may increasingly require care from a diminishing working population. PCS may help address the consequences of this imbalance. Improved methods for monitoring health and wellbeing could allow people to live longer in their own homes. Sensors embedded in items of clothing, for example, might allow constant monitoring of heart rates, body-mass index, blood pressure and other physiological variables. Further sensors embedded throughout the home could detect movement and fluctuations within the ambient environment (such as temperature change) to alert care-workers to any irregularities. Visual displays or voice messages could also have the potential to remind people to take medications, while video telephones could provide personal contact with friends, family and careers.

Digi-tickers or implanted heart monitors in heart patients will talk wirelssly to computers, which will be trained to keep an eye open for abnormalities.

Pervasive computing will be extensively used in health care

Watches will be capable of reading our sugar levels.

9
ENVIRONMENTAL MONITORING: The traffic can be organized very well with the help of pervasive computing. NEGATIVE CONSEQUENCES:

Pervasive computing provides improved methods to monitor the environment. It will allow for continuous realtime data collection and analysis via remote, wireless devices. TRANSPORT SYSTEM: Pervasive Computing Technologies are being employed in the development of intelligent transport systems to try to alleviate these costs. Such systems seek to bring together information and telecommunications technologies in a collaborative scheme to improve the safety, efficiency and productivity of transport networks. Electronic devices could be directly integrated into the transport infrastructure, and into vehicles themselves, with the aim of better monitoring and managing the movement of vehicles within road, rail, air and sea transport systems. Computers are already incorporated into modern cars via integrated mobile phone systems, parking sensors and complex engine management systems. Intelligent transport systems take this process further by introducing 'intelligent' elements into vehicles. Vehicles could become capable of receiving and exchanging information on the move via wireless technologies and be able to communicate with devices integrated into transport infrastructure, alerting drivers to traffic congestion, accident hotspots, and road closures. Alternative routes could be relayed to in-car computers, speeding up journey times and reducing road congestion. This would bring added coordination to the road transport system, enabling people and products to travel more securely and efficiently. Greater communication and coordination between different transport sectors (road, rail, air, etc.) may help fulfil integrated transport policies.

PRIVACY: With personal information being collected, transmitted and stored in greater volume, the opportunities for data interception, theft and ubiquitous surveillance (official and unofficial) will be heightened. PCS could be embedded in places considered private, such as the home. Data on many aspects of personal life could be recorded and stored, with the risk of breaches of privacy. The advent of pervasive computing may mean that data can be collected without a persons knowledge or consent. Some argue that this could violate existing data protection law4. This law also requires that personal data should be collected for a specified purpose only. However the opportunities for data mining activities ENVIRONMENT: While the consumption of natural resources might be reduced through the miniaturisation of PCS devices, any gains are likely to be offset by technological proliferation. This may be compounded by problems of treating microelectronic waste embedded in other objects and has implications for recycling because of the possibility of such waste contaminating recycling channels. While some of these issues are likely to be covered by the transposition into UK law of the EC Directive on Waste Electrical and Electronic Equipment, further action (including further regulation) may be required. HEALTH: Non-ionising radiation is a by-product of the wireless signals that are likely to be used to connect pervasive computing devices into broader networks. As these devices may be carried close to the body (more so than current ICT) and remain constantly activated, there may be increased risk from exposure of body tissues to the potentially damaging effects of such radiation. DIGITAL DIVIDE: There is a risk of technological and social isolation for those who do not use the technology (whether it be through choice, lack of income or skills). For instance, banking, education and retail services are likely to be delivered through PCS embedded within smart homes,this could lead to some consumers being deprived of access and freedom of choice.

10

A PEEP INTO THE WORLD OF PERVASIVE COMPUTING


Jane is at Gate 23 in the Pittsburgh airport, waiting for her connecting flight. She has edited many large documents, and would like to use her wireless connection to e-mail them. Unfortunately, bandwidth is miserable because many passengers at Gates 22 and 23 are surfing the web. Aura observes that at the current bandwidth Jane wont be able tofinish sending her documents before her flight departs. Consulting the airports network weather service and flight schedule service, Aura discovers that wireless bandwidth is excellent at Gate 15, and that there are no departing or arriving flights at nearby gates for half an hour. A dialog box pops up on Janes screen suggesting that she go to Gate 15, which is only three minutes away. It also asks her to prioritize her e-mail, so that the most critical messages are transmitted first. Jane accepts Auras advice and walks to Gate 15. She watches CNN on the TV there until Aura informs her that it is close to being done with her messages ,and that she can start walking back. The last message is transmitted during her walk, and she is back at Gate 23 in time for her boarding call Jane is able to complete her email transmission only because Aura had the foresight to estimate how long the whole process would take. She is able to begin walking back to her departure gate before transmission completes because Aura looks ahead on her behalf.

Future life model where pervasive computing becomes an integral part of our life Fred is in his office, frantically preparing for a meeting at which he will give a presentation and a software demonstration. The meeting room is a ten-minute walk across campus. It is time to leave, but Fred is not quite ready. He grabs his PalmXXII wireless

11
handheld computer and walks out of the door. Aura transfers the state of his work from his desktop to his handheld, and allows him to make his final edits using voice commands during his walk.Aura infers where Fred is going from his calendar and the campus location tracking service. It downloads the presentation and the demonstration software to the projection computer, and warms up the projector. Fred finishes his edits just before he enters the meeting room. As he walks in, Aura transfers his final changes to the projection computer. As the presentation proceeds, Fred is about to display a slide with highly sensitive budget information. Aura senses that this might be a mistake: the rooms face detection and recognition capability indicates that there are some unfamiliar faces present. It therefore warns Fred. Realizing that Aura is right, Fred skips the slide. He moves on to other topics and ends on a high note, leaving the audience impressed by his polished presentation .The ability to move execution state effortlessly across diverse platforms from a desktop to a handheld machine, and from the handheld to the projection computer. Self-tuning, or automatically adjusting behavior to fit circumstances, is shown by the ability to edit on the handheld using speech input rather than keyboard and mouse. The scenario embodies many instances of proactivity inferring that Fred is headed for the room across campus, warming up the projector, transferring the presentation and demonstration, anticipating that the budget slide might be displayed next, and sensing danger by combining this knowledge with the inferred presence of strangers in the room. The value of smart spaces is shown in many ways the location tracking and online calendar services are what enable Aura to infer where Fred is heading; the software-controlled projector enables warmup ahead of time; the camera-equipped room with continuous face recognition is key to warning Fred about the privacy violation he is about to commit. interaction (especially multi-modal interactions and human-centric hardware designs), software agents (with specific relevance to high-level proactive behavior), and expert systems and artificial intelligence (particularly in the areas of decision making and planning). Capabilities from these areas will need to be integrated to implement pervasive computing. Pervasive computing will thus be the crucible in which many disjoint areas of research are fused.

World and pervasive computing will become inseparable. REFERENCES: 1. www.pervasive.dk/ 2. www.computer.org/pervasive 3.en.wikipedia.org/wiki/Ubiquitou s_computing 4. www.pervasivehealth.org/

CONCLUSION:
Pervasive computing offers new beginnings for the adventurous and the restless a rich open space where the rules have yet to be written and the borders yet to be drawn .Pervasive computing will be a fertile source of challenging research problems in computer systems for many years to come.We will also have to address research challenges in areas outside computer systems. These areas include human-computer

También podría gustarte