0% found this document useful (0 votes)
68 views24 pages

Ubiquitous Computing or Pervasive Computing

This document summarizes a presentation about ubiquitous computing and pervasive computing. Some key points include: - Ubiquitous computing integrates computation into the environment rather than having distinct computer objects. It allows natural interaction with information through location and context. - Goals include invisible technology, integration of virtual and physical worlds, and enhancing ability to act through access to data. - Aspects discussed include mobile computing, intelligent environments with embedded sensors, adaptive application architectures, and challenges around security, privacy, and management of complex systems. - Examples provided include smart dust sensors, intelligent paper/glass/garments, and healthcare applications like remote patient monitoring. Consumer devices are moving towards more context-

Uploaded by

Rajiyung Sun
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
68 views24 pages

Ubiquitous Computing or Pervasive Computing

This document summarizes a presentation about ubiquitous computing and pervasive computing. Some key points include: - Ubiquitous computing integrates computation into the environment rather than having distinct computer objects. It allows natural interaction with information through location and context. - Goals include invisible technology, integration of virtual and physical worlds, and enhancing ability to act through access to data. - Aspects discussed include mobile computing, intelligent environments with embedded sensors, adaptive application architectures, and challenges around security, privacy, and management of complex systems. - Examples provided include smart dust sensors, intelligent paper/glass/garments, and healthcare applications like remote patient monitoring. Consumer devices are moving towards more context-

Uploaded by

Rajiyung Sun
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 24

Ubiquitous Computing

or
Pervasive Computing

A seminar presentation by:


Mujtaba Mobin Bora
E-13/07
Department of Electrical Engineering
Jorhat Engineering College.
Any guess ? ? ?
The Trends in Computing Technology
and Ubiquitous Computing
 Major computing trends

Mainframe
 Many people share a computer
 Personal computer
 One computer – one person
 Internet
 Distributed computing
 Transition
 Ubiquitous computer
 Many computers share us
What we will deal with…
• What is Ubiquitous computing ?
• Goals of Pervasive (Ubiquitous) Computing
• Mobile computing
• Intelligent environment
• Adaptive architecture
• Security, privacy and management
What is Ubiquitous Computing?
 Technology View
• Computers everywhere – embedded into fridges, washing
machines, door locks, cars, furniture, people
intelligent environment
• Mobile portable computing devices
• Wireless communication – seamless mobile/fixed
 User View
• Invisible – implicit interaction with your environment
• Augmenting human abilities in context of tasks
 Ubiquitous = mobile computing + intelligent
environment
UBIQUITOUS OR PERVASIVE
• Ubiquitous OR pervasive computing (ubicomp)
integrates computation into the environment, rather
than having computers which are distinct objects.
• The idea of ubicomp enable people to interact with
information-processing devices more naturally and
casually, and in ways that suit whatever location or
context they find themselves in.
Goals of Pervasive
(Ubiquitous) Computing
• Ultimate goal:

• Invisible technology
• Integration of virtual and physical worlds
• Throughout desks, rooms, buildings, and life

• Take the data out of environment, leaving behind


just an enhanced ability to act
Some good aspects of
Ubiquitous Computing

• Mobile computing

• Intelligent environment

• Security, privacy and management


Main IDEA behind the concept…

Distributed System

Ubiquitous Computing

Mobile Computing
Mobile Computing
• Mobile computing
• Computing & communication on the move
• Mostly voice based or embedded?
• Nomadic computing
• Intermittent connectivity
• Usual environment available
• Mobile agents
• Mobile code and data
Mobile Computing Vision
• Universal connectivity – anywhere, anytime

• Accommodate heterogeneity of networks and


communicators
• Ubiquitous intelligent environment – embedded
computers everywhere
• Easy user interaction

• Context independent access to services + context


dependent information
Intelligent Environment
 Smart Dust
• Autonomous sensing and communication in a cubic
millimetre – “dust motes”
• Sensors for temperature, humidity, light, motion ….
• With bidirectional radio or laser + battery
• Typical Applications
• Defence related battlefield sensors, motion detectors etc.
• Inventory control on boxes which communicate with crates,
trucks, plane etc to tell you where they are
• Product quality monitoring – vibration, humidity, overheating
• Car component monitoring
Contd…
• Intelligent paper with integrated radio 

replace current displays


• Smart paint  monitors vibrations and detect intruders or

changes colour to react to temperature, lighting etc.


• Intelligent glass  filter sunlight & become opaque 

no need for curtains


• Smart garments or injectable sensors for people

monitoring
Intelligent Environment, goes on…
• Lights, air-conditioners, TV’s automatically switch on and
off when you enter or leave rooms
• Sit on your favourite chair and TV switches on to the
program you usually watch at this time of the day
• Use communicator/PDA for phone, remote control, keys,
payments, passport, health records, authenticator.
• Route input from ‘virtual’ keyboard to nearest suitable
display.
• Automatic detection of new items to control and physical
layout in a room or office, using computer vision.
Adaptive Application Architecture

Remote
Application
Servers

Sensors
Local & Network
Intermediate Servers

Clients
Security
• Interactions cross multiple organisational boundaries
• Specification, analysis and integration for
heterogeneous OS, databases, firewalls, routers
• Lessons from history:
• Cell phones, IR garage doors, CATV decoders
• Everything worth hacking gets hacked
• Need for secure ‘out of the box’ set up
• Identify friend or foe  level of trust
• Small communicators, with confidential data, are
easily lost or stolen – biometric authentication
• Necessary security technology exists
Privacy
• Location service tracks movement to within metres
(cf mobile phones but pay-as-you-go can be anonymous).
• Clearly indicate you are being sensed or recorded + user
control to stop recording or control distribution of information
• You are now predictable
• System can co-relate location, context and behaviour patterns
• Do you want employer, colleagues or insurance company to
know you carry a medical monitor?
• Tension between authentication and anonymity – business
want to authenticate you for financial transactions and to
provide
‘personalized’ service cf web sites
• Constant spam of context dependent advertising
Management
• Huge, complex systems
• Billions of processors
• Multiple organisations
• Managing physical world, controlling sensors, actuators
• Humans will be in the way
• Errors propagate to bring down complete regions
• Hacker and virus paradise
• System propagates false information about
individuals or organisation
• Complexity of s/w installation on a workstation or
server – how do you cope with billions?
UbiCare: Ubiquitous
computing for community care
• Applications
• Automated monitoring
• Implanted devices
• Smart clothing
• Swallow/inject intelligent sensors and actuators
• Accident and emergency support
• Patient record access and integration
• Benefits
• Lower risk monitoring
• Mobility for chronically ill Wireless video Camera Pill
• Greater out-of-hospital patient management
• Predictive care from mass data analysis
Some specs of neo inventions…..
 Current incarnations
 Consumer devices
 More Consumer devices….
The i-band
 I-band wearable social-networking bracelet

Context-activation triggers exchange of personal
information
Conclusion…
Questions if any???

Thanks…

You might also like