0% found this document useful (0 votes)
64 views6 pages

Chettinad College of Engineering and Technology

This document provides the course plan for Pervasive Computing offered at Chettinad College of Engineering and Technology. The course aims to provide fundamental concepts and knowledge in pervasive computing including sensor networks, smart systems, and various applications. Key topics covered include pervasive computing principles, devices/interfaces, connectivity protocols, security, and middleware components. Reference books and links to similar courses at other universities are also included. The lesson plan lists topics to be covered such as pervasive applications, Web services, software development, and interfaces. Assignments, seminar topics and monthly tests are outlined.

Uploaded by

msksaran
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
64 views6 pages

Chettinad College of Engineering and Technology

This document provides the course plan for Pervasive Computing offered at Chettinad College of Engineering and Technology. The course aims to provide fundamental concepts and knowledge in pervasive computing including sensor networks, smart systems, and various applications. Key topics covered include pervasive computing principles, devices/interfaces, connectivity protocols, security, and middleware components. Reference books and links to similar courses at other universities are also included. The lesson plan lists topics to be covered such as pervasive applications, Web services, software development, and interfaces. Assignments, seminar topics and monthly tests are outlined.

Uploaded by

msksaran
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 6

CHETTINAD COLLEGE OF ENGINEERING AND TECHNOLOGY

DEPARTMENT OF INFORMATION TECHNOLOGY


COURSE PLAN
Name of the Staff : Mr.M.Saravana arth!"e#an
S$%&e't ( Co)e : Perva*!ve Com+$t!n, ( -.-/0--12
Co$r*e : 3.Te'h 4IT5
Year 6 Sem 6 Se't!on : I767II 6 IT
PRE8RE9UISITE:
Knowledge in Fundamentals of Computing, Networks, RFID and Sensor,
Computing devices, Web Services
O3:ECTI7ES:
!o provide a fundamental concepts in "ervasive Computing
!o provide basic knowledge in various disciplines t#at support "ervasive
Computing
!o enable t#e students to understand various functional areas of "ervasive
Computing
!o provide t#e knowledge of "ervasive applications
LEARNING OUTCOME:
$nderstanding man% of t#e areas t#at comprise t#e field of "ervasive Computing
&arious smart computing S%stems and knowledge in sensor networks
&arious areas of "ervasive applications
REFERENCE 3OO:
R;. Jochen Burkhardt, Horst Henn, Stefan Hepper, Thomas Schaec, Klaus
Rindtorff, Pervasive Computing Technolog and !rchitecture of "o#ile
$nternet !pplications%, !ddison &esle, 'e( )elhi, *++*
R/. ,(e Hansman, -othat "erk, "artin S 'icklous, Thomas Sto#er, Pervasive
Computing . Hand#ook%, Springer. /erlag, 'e( )elhi, *++0
R<. ,(e Hansman, -othat "erk, "artin S 'icklous, Thomas Sto#er, Principles
of "o#ile Computing%, Springer. /erlag, 'e( )elhi, *++0
R1. 1rank !delstein , Sandeep K2S2 3upta, 3olden 32Richard $$$, -oren
Sch(ie#ert ,%1undamentals of "o#ile and Pervasive Computing%,Tata "c3ra(.
Hill 4dition , 'e( )elhi, *++52
=E3 LINS FOR SIMILAR COURSES OFFERED AT OTHER UNI7ERSITIES:
S.No Co$r*e T!t>e Name of the Un!ver*!t# =e% *!te
'
CS$4567++ Pervasive
Computing
'ational )ong H(a
,niversit
http899(((2csie2ndhu2edu2t(9:sho(ang9Pe
rCom*++7f9slla#us2html
(
CS 5508 Pervasive
Computing
$llinois $nstitute of
Technolog
http899(((2cs2iit2edu9courses9cs5502html
)
"242 ";B$-4 !')
P4R/!S$/4 C;"P,T$'3
!nna University Chennai http899tifac2velammal2org9"4 <Presrving
Computing<Slla#us2pdf
*
"242 P4R/!S$/4
C;"P,T$'3
T4CH';-;3$4S
!nna ,niversity
Tiruchirappalli
http899aut*2tau2edu2in8=+=+9R.
*++=9inde>2?sp
+
"o#ile and Pervasive
Computing Research in the
Computer Science
Carnegie "ellon
,niversit
http899(((2csd2cs2cmu2edu9research9areas9
mopercomp9
,
72=@= Pervasive Computing "assachusetts $nstitute of
Technolog
http899groups2csail2mit2edu9cag9classes972=@
=9inde>2html
LESSON PLAN:
To+!'
No
To+!' Name
Referen'e* No of
Per!o)*
C$m$>at!ve
No of
Per!o)*
UNIT8I PER7ASI7E COMPUTING APPLICATION
'
"ervasive computing- Introduction
R' . ',,(/ 0 ' '
( "rinciples of "ervasive computing
R) . '1 2 (( 0 '
(
) Devices and Interfaces R( . (+ 2 ** 0
(
*
*
Device !ec#nolog%
R' . +1 2 '3( 0 ( ,
+ Device Connectivit%4 "rotocols R' . '3, 2 ')3 0
)
5
, Securit% R' . ')' 2 '*' 0
(
''
1 Device 6anagement R' . '*( - '*, 0 '
'(
UNIT8II PER7ASI7E COMPUTING AND =E3 3ASED APPLICATIONS
/
768,Web services 9 "ervasive
Computing
R' .(+*-(,'0
R( . (3/ 2 ('3 0 (
'*
5 W:"-Introduction and :rc#itecture R' . ',/ 2 '1' 0
'
'+
'3 W:" Infrastructure R' .'1(-'1,0 ' ',
'' Securit% Issues
R' . '11-'1/ 0 '
'1
'( W68-Introduction R' . '15-'/1 0
(
'5
UNIT8III MIDDLE=ARE COMPONENTS
') "rogramming Consumer Devices R( . '13 2 '1+ 0 ( ('
'* Smart card "rogramming R( . '1, 2 '/' 0
(
()
'+ 6essaging Components
R( . '/( 2 '/* 0 '
(*
', Database Components
R( . '/+2 '/1 0 (
(,
UNIT8I7 PDA IN PER7ASI7E COMPUTING
'1 "D: - Introduction R' . (', 0
'
(1
'/ Device categories 9 ;perating S%stems R' .('1 2 ('50 ( (5
'5 Standards and !rends R' .((+-((/0 ' )3
(3 Software Components R' .(((-(()0 ( )(
(' Device C#aracteristics R' .((' 2 (((0
'
))
(( "D: <ased :ccess :rc#itecture "resentation
(
)+
UNIT87 USER INTERFACE ISSUES IN PER7ASI7E COMPUTING
() "ervasive application :rc#itecture R' . (/(-(/* 0
(
)1
(* $ser Interface R' . (55-)3( 0
(
)5
(+ Smart card 2 :ut#entication 6ec#anisms R' .)(/-))30 ( *'
(, Wearable Computing Stud% material
(
*)
(1 WC-:rc#itecture Stud% material
'
**
(/ Case stud%-"ro=ects Stud% material ( *,
MONTHLY TEST PORTIONS:
Interna> Te*t No To+!' No
I '-/
II 5-'1
III '/-(/
=E3 RESOURCES:
To+!'
No
To+!' Name =e%*!te L!n"
'
"ervasive
Computing
#ttp4>>wwwtec#nolog%reviewin>computing>'(1*)>
#ttp4>>wwweducauseedu>?D$C:$S?@Review>?D$C:$S?Revie
w6agaAine&olume*3>"ervasiveComputingBoestoSc#ool>'+15+/
(
6obile
Computing 9
Wireless
Communications
wwwam=adumarcom>IR6:-wireless-talkppt
#ttp4>>wwwmobilecomms-tec#nolog%com>downloads>w#itepapers>
) Data :ccess
wwwcsuoigr>Cpitoura>icde33-tutorialppt
#ttp4>>wwwcsberkele%edu>Cfranklin>!alks>CFDvldb(33'E,uppdf
* 6iddleware
#ttp4>>wwwmiddlewareorg>
#ttp4>>wwwstud%templecom>forum>tele-communication-
networking>'/1,,+-middleware-communications#tml
#ttp4>>wwweecgtorontoedu>C=acobsen>courses>ece'113>indeF-
3(#tml
+
"ervasive
applications
#ttp4>>wwwibmcom>developerworks>wireless>librar%>wi-pvcapps>
#ttp4>>csn%uedu>rgrimm>papers>tocs3*pdf
, Smart card
#ttp4>>wwwsmartcardallianceorg>resources>lib>":CSE:ut#enticatio
nE(335'3',pdf
#ttp4>>peoplecsuc#icagoedu>Cdino=>smartcard>securit%#tml
#ttp4>>wwwsmartcardcouk>tutorials>sct-itscpdf
SEMINAR TOPICS:
G(6?-I
G(6?-II
!in% ;S
Wearable Computing-:pplication
CRICK?! "ro=ect
;7HB?N "ro=ect
ASSIGNMENT TOPICS:
:rtificial Intelligence
Notes on $biIuitous computing
:dvanced Input>;utput Devices in "ervasive ?nvironment
6obile I"
Wireless "ersonal :rea Networks

Pre+are) %#
Staff !n8'har,e

4Mr.M.Saravana arth!"e#an5 HOD 6 IT

You might also like