SlideShare a Scribd company logo
COMPUTING IS EVERYWHERE
AND ANYWHERE
INTRODUCTION
GOALS OF PERVASIVE COMPUTING
LAYERS IN PERVASIVE COMPUTING
PRINCIPLES OF PERVASIVE COMPUTING
VISIONS AND CHALLENGE
DIFFERENCE BETWEEN UBIQUITOUS AND
PERVASIVE COMPUTING
APPLICATIONS
BENEFITS
LIMITATIONS
CONCLUSION
SYNOPSIS
• Pervasive computing (also called ubiquitous
computing) is the growing trend towards
embedding microprocessors in everyday objects so
they can communicate information. The words
pervasive and ubiquitous mean "existing
everywhere." Pervasive computing devices are
completely connected and constantly available.
• Pervasive computing relies on the convergence
of wireless technologies, advanced electronics and
the Internet. The goal of researchers working in
pervasive computing is to create smart products that
communicate unobtrusively. The products are
connected to the Internet and the data they generate
is easily available.
The idea that technology is moving beyond
the personal computer to everyday devices
with embedded technology and connectivity
as computing devices become progressively
smaller and more powerful. Also
called ubiquitous computing, pervasive
computing is the result of computer
technology advancing at exponential speeds -
- a trend toward all man-made and some
natural products having hardware and
software.

Recommended for you

Internet of things startup basic
Internet of things  startup basicInternet of things  startup basic
Internet of things startup basic

The document discusses Internet of Things (IoT) and Industrial Internet of Things (IIoT). It provides examples of IoT in areas like smart agriculture, energy consumption, security, and healthcare. It then describes key enabling technologies for IoT like low-power devices, Bluetooth, and the need for open connectivity standards. The document also discusses the growth of the IoT market and applications of robotics. It then focuses on defining IIoT and comparing it to IoT and M2M. The document outlines requirements and benefits of IIoT like cloud computing, analytics, and improved efficiency. Real-life examples of IIoT in industries like aviation, oil and gas are also provided.

venkateshmathanvijayakumar
IoT ecosystem
IoT ecosystemIoT ecosystem
IoT ecosystem

What IoT Is ? IoT Applications IoT Architecture IoT Protocol Development Board IoT Cloud Platform IoT prediction IoT Challanges

internet of thingsiotbig data
PERVASIVE COMPUTING
PERVASIVE COMPUTINGPERVASIVE COMPUTING
PERVASIVE COMPUTING

Pervasive computing involves the interaction of numerous computing devices connected via wired and wireless links. This seminar discusses pervasive computing technologies and applications, including information access, mobility and networking, perceptive interfaces, and real-time applications. It also outlines some ongoing research projects and concludes that pervasive computing continues to affect more populations through regional and cultural influences on the technologies.

ppttechnologytechnical seminar
GOAL OF PERVASIVE COMPUTING
Pervasive computing goes beyond the realm of
personal computers: it is the idea that almost any
device, from clothing to tools to appliances to cars to
homes to the human body to your coffee mug, can be
imbedded with chips to connect the device to an
infinite network of other devices. The goal of
pervasive computing, which combines current
network technologies with wireless computing, voice
recognition, Internet capability and artificial
intelligence, is to create an environment where the
connectivity of devices is embedded in such a way
that the connectivity is unobtrusive and always
available.
Pervasive Computing
Layer 1: task management layer
 Monitors user task, context and index
 Map user's task to need for the services in the
environment
 To manage complex dependencies
Layer 2: environment management layer
 To monitor a resource and its capabilities
 To map service need, user level states of specific
capabilities
Layer 3: environment layer
 To monitor a relevant resource
 To manage reliability of the resources
Pervasive Computing

Recommended for you

WSN IN IOT
WSN IN IOTWSN IN IOT
WSN IN IOT

This document discusses wireless sensor networks and their role in the Internet of Things. It defines sensor networks and their architecture, including sensor nodes that communicate wirelessly to a base station. It outlines challenges for sensor networks like fault tolerance, scalability, and quality of service. It also describes how sensor networks can be integrated into the Internet of Things through different approaches, with the first using a single gateway and later approaches using hybrid networks and access points. Applications of sensor networks in IoT include wearable devices collecting biometric data and communicating it to servers.

Ubiquitous computing
Ubiquitous computingUbiquitous computing
Ubiquitous computing

Ubiquitous computing, also known as pervasive computing, refers to the concept of integrating computation into everyday objects and environments. It allows computing to occur anytime and anywhere using any device. The father of ubiquitous computing is Mark Weiser, who first articulated the idea in 1988 and envisioned computers being embedded everywhere in a way that is invisible to the user. Ubiquitous computing represents the third generation of computing after mainframes and personal computers, enabling one person to use many computers. While it provides advantages like efficient information access anywhere, ubiquitous computing also faces challenges related to security, connectivity, and costs.

ubiquitous computingwearable technology
Ubiquitous computing
Ubiquitous computing Ubiquitous computing
Ubiquitous computing

Ubiquitous computing is one of the most prodiously growing topic which will be covering all facets of life.In the course of ordinary activities, someone "using" ubiquitous computing engages many computational devices and systems simultaneously, and may not necessarily even be aware that they are doing so. This model is considered an advancement from the older desktop paradigm. More formally, ubiquitous computing is defined as "machines that fit the human environment instead of forcing humans to enter theirs".

ubiquitous computingmark weiserubiquity
VISIONS AND CHALLENGE
The essence of that vision was the creation of
environments saturated with computing and
communication capability, yet gracefully integrated
with human users. When articulated, this was a
vision too far ahead of its time — the hardware
technology needed to achieve it simply did not
exist.
• Ubiquitous means everywhere. Pervasive means "diffused throughout every part of." In
computing terms, those seem like somewhat similar concepts. Ubiquitous computing
would be everywhere, and pervasive computing would be in all parts of your life.
• That might mean the difference between seeing kiosks on every street corner and
finding that you could -- or need to -- use your Palm handheld to do absolutely every
information-based task.
• And, in fact, that's where the difference between these two types of computing lies.
Pervasive computing involves devices like handhelds -- small, easy-to-use devices --
through which we'll be able to get information on anything and everything. That's the
sort of thing that Web-enabled cell phones promise. Ubiquitous computing, though,
eschews our having to use computers at all. Instead, it's computing in the background,
with technology embedded in the things we already use. That might be a car navigation
system that, by accessing satellite pictures, alerts us to a traffic jam ahead, or an oven
that shuts off when our food is cooked.
Pervasive describes things that spread through a place to become established
everywhere.
Ubiquitous describes things that are everywhere in a place because it is the nature of that
place to have those ubiquitous things.
APPLICATIONS
BENEFITS
 INVISIBLE:
“Smart” environments will be embedded with computing technologies that will be
mostly out-of-sight.
 SOIALIZATION:
“Smart” buildings will illicit a more social response from occupants as computers user
interfaces embed themselves within architecture.
 DECISION-MAKING:
“Smart” environments will help occupants to make better choices as they go about
their everyday lives.
 EMERGENT BEHAVIOR:
Buildings are now becoming more and more kinetic in form and function. Their
movements and constructed designs come together dynamically to yield behaviours
that make them more adaptive.
 INFORMATION PROCESSING:
Architecture will go from crunching data to making sense of data; therefore,
eliminating our need to constantly input adjustments.
 ENHANCING EXPERIENCE:
As computers ubiquitously embed themselves in our environments, sensors and
actuators will create “smart” environments where architecture space will be goal
oriented.
 CONVERGENCE:
Much of our environment will be supplemented with interconnected digital
technologies.

Recommended for you

IoT sensor devices
IoT sensor devicesIoT sensor devices
IoT sensor devices

Presentation about Internet of Things Sensor Devices given by Roman Staszewski at IoT Prototyping Workshop in Dallas, TX on August 30, 2016

deviceswirelessiot
Introduction to Google App Engine
Introduction to Google App EngineIntroduction to Google App Engine
Introduction to Google App Engine

Google App Engine - Platform for Cloud Computing .Presented on Aug 23,2008 at HYSEA Conference on Cloud Computing held at Google Hyderabad

hyderabadindiarelations
Internet of Things (IOT) - Technology and Applications
Internet of Things (IOT) - Technology and ApplicationsInternet of Things (IOT) - Technology and Applications
Internet of Things (IOT) - Technology and Applications

The document discusses Internet of Things (IoT) technologies and applications. It defines IoT, describes its characteristics and components. It also discusses challenges in IoT deployment areas like identification, architecture, communication technologies, and the need for protocols like 6LoWPAN to allow IPv6 connectivity over low power wireless personal area networks. Delay Tolerant Networking (DTN) is also introduced as a way to allow intermittent connectivity in challenged environments.

iotinternet of things
LIMITATIONS
 Not entirely secure
 Frequent line connections that are broken
 Slow connections
 Very expensive operating costs
CONCLUSION
Pervasive Computing

More Related Content

What's hot

Distributed computing
Distributed computingDistributed computing
Distributed computing
shivli0769
 
UBIQUITOUS COMPUTING - Mary M
UBIQUITOUS COMPUTING - Mary MUBIQUITOUS COMPUTING - Mary M
UBIQUITOUS COMPUTING - Mary M
Mary Margarat
 
security and privacy-Internet of things
security and privacy-Internet of thingssecurity and privacy-Internet of things
security and privacy-Internet of things
sreelekha appakondappagari
 
Internet of things startup basic
Internet of things  startup basicInternet of things  startup basic
Internet of things startup basic
Mathan kumar
 
IoT ecosystem
IoT ecosystemIoT ecosystem
IoT ecosystem
Md. Shamsul Haque
 
PERVASIVE COMPUTING
PERVASIVE COMPUTINGPERVASIVE COMPUTING
PERVASIVE COMPUTING
VENKATA RAMANA PRABHALAVEEDU
 
WSN IN IOT
WSN IN IOTWSN IN IOT
WSN IN IOT
skumartarget
 
Ubiquitous computing
Ubiquitous computingUbiquitous computing
Ubiquitous computing
Pragya Srivastava
 
Ubiquitous computing
Ubiquitous computing Ubiquitous computing
Ubiquitous computing
Govind Raj
 
IoT sensor devices
IoT sensor devicesIoT sensor devices
IoT sensor devices
Roman Staszewski
 
Introduction to Google App Engine
Introduction to Google App EngineIntroduction to Google App Engine
Introduction to Google App Engine
rajdeep
 
Internet of Things (IOT) - Technology and Applications
Internet of Things (IOT) - Technology and ApplicationsInternet of Things (IOT) - Technology and Applications
Internet of Things (IOT) - Technology and Applications
Dr. Mazlan Abbas
 
Internet of Things (IoT) - Seminar ppt
Internet of Things (IoT) - Seminar pptInternet of Things (IoT) - Seminar ppt
Internet of Things (IoT) - Seminar ppt
Nishant Kayal
 
Ambient intelligence
Ambient intelligenceAmbient intelligence
Ambient intelligence
Nikhil Patteri
 
Ubiquitous Computing
Ubiquitous ComputingUbiquitous Computing
Ubiquitous Computing
u065932
 
Top Technology Trends in IoT for 2022
Top Technology Trends in IoT for 2022Top Technology Trends in IoT for 2022
Top Technology Trends in IoT for 2022
engineermaste solution
 
Internet of things (IoT)
Internet of things (IoT)Internet of things (IoT)
Internet of things (IoT)
Prakash Honnur
 
Edge Computing
Edge ComputingEdge Computing
Edge Computing
Chetan Kumar S
 
Internet of Things (IoT) and its applications
Internet of Things (IoT) and its applicationsInternet of Things (IoT) and its applications
Internet of Things (IoT) and its applications
Sarwan Singh
 
Cloud of things (IoT + Cloud Computing)
Cloud of things (IoT + Cloud Computing)Cloud of things (IoT + Cloud Computing)
Cloud of things (IoT + Cloud Computing)
Zakaria Hossain
 

What's hot (20)

Distributed computing
Distributed computingDistributed computing
Distributed computing
 
UBIQUITOUS COMPUTING - Mary M
UBIQUITOUS COMPUTING - Mary MUBIQUITOUS COMPUTING - Mary M
UBIQUITOUS COMPUTING - Mary M
 
security and privacy-Internet of things
security and privacy-Internet of thingssecurity and privacy-Internet of things
security and privacy-Internet of things
 
Internet of things startup basic
Internet of things  startup basicInternet of things  startup basic
Internet of things startup basic
 
IoT ecosystem
IoT ecosystemIoT ecosystem
IoT ecosystem
 
PERVASIVE COMPUTING
PERVASIVE COMPUTINGPERVASIVE COMPUTING
PERVASIVE COMPUTING
 
WSN IN IOT
WSN IN IOTWSN IN IOT
WSN IN IOT
 
Ubiquitous computing
Ubiquitous computingUbiquitous computing
Ubiquitous computing
 
Ubiquitous computing
Ubiquitous computing Ubiquitous computing
Ubiquitous computing
 
IoT sensor devices
IoT sensor devicesIoT sensor devices
IoT sensor devices
 
Introduction to Google App Engine
Introduction to Google App EngineIntroduction to Google App Engine
Introduction to Google App Engine
 
Internet of Things (IOT) - Technology and Applications
Internet of Things (IOT) - Technology and ApplicationsInternet of Things (IOT) - Technology and Applications
Internet of Things (IOT) - Technology and Applications
 
Internet of Things (IoT) - Seminar ppt
Internet of Things (IoT) - Seminar pptInternet of Things (IoT) - Seminar ppt
Internet of Things (IoT) - Seminar ppt
 
Ambient intelligence
Ambient intelligenceAmbient intelligence
Ambient intelligence
 
Ubiquitous Computing
Ubiquitous ComputingUbiquitous Computing
Ubiquitous Computing
 
Top Technology Trends in IoT for 2022
Top Technology Trends in IoT for 2022Top Technology Trends in IoT for 2022
Top Technology Trends in IoT for 2022
 
Internet of things (IoT)
Internet of things (IoT)Internet of things (IoT)
Internet of things (IoT)
 
Edge Computing
Edge ComputingEdge Computing
Edge Computing
 
Internet of Things (IoT) and its applications
Internet of Things (IoT) and its applicationsInternet of Things (IoT) and its applications
Internet of Things (IoT) and its applications
 
Cloud of things (IoT + Cloud Computing)
Cloud of things (IoT + Cloud Computing)Cloud of things (IoT + Cloud Computing)
Cloud of things (IoT + Cloud Computing)
 

Viewers also liked

I hear voices: Explorations of multidevice experiences with conversational as...
I hear voices: Explorations of multidevice experiences with conversational as...I hear voices: Explorations of multidevice experiences with conversational as...
I hear voices: Explorations of multidevice experiences with conversational as...
Karen Kaushansky
 
Why docker | OSCON 2013
Why docker | OSCON 2013Why docker | OSCON 2013
Why docker | OSCON 2013
dotCloud
 
Ambient intelligence & Ubiquitous Computing
Ambient intelligence & Ubiquitous ComputingAmbient intelligence & Ubiquitous Computing
Ambient intelligence & Ubiquitous Computing
Rohit Arora
 
Ubiquitous Computing
Ubiquitous ComputingUbiquitous Computing
Ubiquitous Computing
Vashira Ravipanich
 
Introduction to Ubiquitous Computing
Introduction to Ubiquitous ComputingIntroduction to Ubiquitous Computing
Introduction to Ubiquitous Computing
Honeyson Joseph
 
Conversational Architecture, CAVE Language, Data Stewardship
Conversational Architecture, CAVE Language, Data StewardshipConversational Architecture, CAVE Language, Data Stewardship
Conversational Architecture, CAVE Language, Data Stewardship
Loren Davie
 
Pervasive Computing : You're Already Knee Deep In It
Pervasive Computing : You're Already Knee Deep In ItPervasive Computing : You're Already Knee Deep In It
Pervasive Computing : You're Already Knee Deep In It
Rob Manson
 
Security and privacy issues of pervasive computing
Security and privacy issues of pervasive computingSecurity and privacy issues of pervasive computing
Security and privacy issues of pervasive computing
Ram kumar
 
Products are Services, how ubiquitous computing changes design
Products are Services, how ubiquitous computing changes designProducts are Services, how ubiquitous computing changes design
Products are Services, how ubiquitous computing changes design
Mike Kuniavsky
 
Understanding the New World of Cognitive Computing
Understanding the New World of Cognitive ComputingUnderstanding the New World of Cognitive Computing
Understanding the New World of Cognitive Computing
DATAVERSITY
 
Docker on IoT Devices
Docker on IoT DevicesDocker on IoT Devices
Docker on IoT Devices
Docker, Inc.
 
Cognitive Computing : Trends to Watch in 2016
Cognitive Computing:  Trends to Watch in 2016Cognitive Computing:  Trends to Watch in 2016
Cognitive Computing : Trends to Watch in 2016
Bill Chamberlin
 
Fog computing
Fog computingFog computing
Fog computing
Hari Priyanka
 
Seminar on pervasive computing
Seminar  on pervasive computingSeminar  on pervasive computing
Seminar on pervasive computing
Likan Patra
 
Bitcoin Seminar - Stockholm
Bitcoin Seminar - StockholmBitcoin Seminar - Stockholm
Bitcoin Seminar - Stockholm
Robin Teigland
 
Pervasive Computing
Pervasive ComputingPervasive Computing
Pervasive Computing
Jurema
 
Inside Bitcoins_AlanReiner
Inside Bitcoins_AlanReinerInside Bitcoins_AlanReiner
Inside Bitcoins_AlanReiner
Mediabistro
 
Rich Mironov Presentation
Rich Mironov PresentationRich Mironov Presentation
Brief lessons from the greatest product managers
Brief lessons from the greatest product managersBrief lessons from the greatest product managers
Brief lessons from the greatest product managers
Jeffrey T. Pollock
 
Guide Report - Wireless Fundementals v1.0 150114
Guide Report - Wireless Fundementals v1.0 150114Guide Report - Wireless Fundementals v1.0 150114
Guide Report - Wireless Fundementals v1.0 150114
Clay Melugin
 

Viewers also liked (20)

I hear voices: Explorations of multidevice experiences with conversational as...
I hear voices: Explorations of multidevice experiences with conversational as...I hear voices: Explorations of multidevice experiences with conversational as...
I hear voices: Explorations of multidevice experiences with conversational as...
 
Why docker | OSCON 2013
Why docker | OSCON 2013Why docker | OSCON 2013
Why docker | OSCON 2013
 
Ambient intelligence & Ubiquitous Computing
Ambient intelligence & Ubiquitous ComputingAmbient intelligence & Ubiquitous Computing
Ambient intelligence & Ubiquitous Computing
 
Ubiquitous Computing
Ubiquitous ComputingUbiquitous Computing
Ubiquitous Computing
 
Introduction to Ubiquitous Computing
Introduction to Ubiquitous ComputingIntroduction to Ubiquitous Computing
Introduction to Ubiquitous Computing
 
Conversational Architecture, CAVE Language, Data Stewardship
Conversational Architecture, CAVE Language, Data StewardshipConversational Architecture, CAVE Language, Data Stewardship
Conversational Architecture, CAVE Language, Data Stewardship
 
Pervasive Computing : You're Already Knee Deep In It
Pervasive Computing : You're Already Knee Deep In ItPervasive Computing : You're Already Knee Deep In It
Pervasive Computing : You're Already Knee Deep In It
 
Security and privacy issues of pervasive computing
Security and privacy issues of pervasive computingSecurity and privacy issues of pervasive computing
Security and privacy issues of pervasive computing
 
Products are Services, how ubiquitous computing changes design
Products are Services, how ubiquitous computing changes designProducts are Services, how ubiquitous computing changes design
Products are Services, how ubiquitous computing changes design
 
Understanding the New World of Cognitive Computing
Understanding the New World of Cognitive ComputingUnderstanding the New World of Cognitive Computing
Understanding the New World of Cognitive Computing
 
Docker on IoT Devices
Docker on IoT DevicesDocker on IoT Devices
Docker on IoT Devices
 
Cognitive Computing : Trends to Watch in 2016
Cognitive Computing:  Trends to Watch in 2016Cognitive Computing:  Trends to Watch in 2016
Cognitive Computing : Trends to Watch in 2016
 
Fog computing
Fog computingFog computing
Fog computing
 
Seminar on pervasive computing
Seminar  on pervasive computingSeminar  on pervasive computing
Seminar on pervasive computing
 
Bitcoin Seminar - Stockholm
Bitcoin Seminar - StockholmBitcoin Seminar - Stockholm
Bitcoin Seminar - Stockholm
 
Pervasive Computing
Pervasive ComputingPervasive Computing
Pervasive Computing
 
Inside Bitcoins_AlanReiner
Inside Bitcoins_AlanReinerInside Bitcoins_AlanReiner
Inside Bitcoins_AlanReiner
 
Rich Mironov Presentation
Rich Mironov PresentationRich Mironov Presentation
Rich Mironov Presentation
 
Brief lessons from the greatest product managers
Brief lessons from the greatest product managersBrief lessons from the greatest product managers
Brief lessons from the greatest product managers
 
Guide Report - Wireless Fundementals v1.0 150114
Guide Report - Wireless Fundementals v1.0 150114Guide Report - Wireless Fundementals v1.0 150114
Guide Report - Wireless Fundementals v1.0 150114
 

Similar to Pervasive Computing

Quality Metrics In Ubiquitous Computing
Quality Metrics In Ubiquitous ComputingQuality Metrics In Ubiquitous Computing
Quality Metrics In Ubiquitous Computing
Rutvik Pensionwar
 
Pervasive computing
Pervasive computingPervasive computing
Pervasive computing
Riya Choudhary
 
UBIQUITOUS COMPUTING
UBIQUITOUS COMPUTINGUBIQUITOUS COMPUTING
UBIQUITOUS COMPUTING
Rutvik Pensionwar
 
Ubiqutous Computing
Ubiqutous ComputingUbiqutous Computing
Ubiqutous Computing
deaneal
 
pervasive-computing-09022014092937-pervasive-computing.ppt
pervasive-computing-09022014092937-pervasive-computing.pptpervasive-computing-09022014092937-pervasive-computing.ppt
pervasive-computing-09022014092937-pervasive-computing.ppt
RishabhRathore71
 
Ubiquitous computing
Ubiquitous computingUbiquitous computing
Ubiquitous computing
Valeria Gasik
 
Ubiquitous Computing
Ubiquitous ComputingUbiquitous Computing
Ubiquitous Computing
Sunil Mahadeva
 
Ubiquitous computing presentation
Ubiquitous computing presentationUbiquitous computing presentation
Ubiquitous computing presentation
Rameshkumar1829
 
Pervasivecomputing 140422034057-phpapp02
Pervasivecomputing 140422034057-phpapp02Pervasivecomputing 140422034057-phpapp02
Pervasivecomputing 140422034057-phpapp02
Pravallika Reddy
 
Ubiquitous computing Paper
 Ubiquitous computing Paper Ubiquitous computing Paper
Ubiquitous computing Paper
Assem mousa
 
Ubiquitous computing abstract
Ubiquitous computing abstractUbiquitous computing abstract
Ubiquitous computing abstract
Priti Punia
 
Ubiquitous computing-and-its-privacy
Ubiquitous computing-and-its-privacyUbiquitous computing-and-its-privacy
Ubiquitous computing-and-its-privacy
Hatum Hussain
 
Ubiquitous computing-and-its-privacy
Ubiquitous computing-and-its-privacyUbiquitous computing-and-its-privacy
Ubiquitous computing-and-its-privacy
Hatum Hussain
 
Introduction uc
Introduction ucIntroduction uc
Introduction uc
Purvi Sankhe
 
Towards Pervasive Computing Environments With Cloud Services
Towards Pervasive Computing Environments With Cloud ServicesTowards Pervasive Computing Environments With Cloud Services
Towards Pervasive Computing Environments With Cloud Services
ijsptm
 
Pervasive computing
Pervasive computingPervasive computing
Pervasive computing
Pallav Kumar
 
WEARABLE COMPUTER.pptx
WEARABLE COMPUTER.pptxWEARABLE COMPUTER.pptx
WEARABLE COMPUTER.pptx
KLakshmi13
 
Ubiquitous Computing
Ubiquitous ComputingUbiquitous Computing
Ubiquitous Computing
sanjaymps
 
Presentation1.pptx
Presentation1.pptxPresentation1.pptx
Presentation1.pptx
ShailiPal1
 
Presentation1.pptx
Presentation1.pptxPresentation1.pptx
Presentation1.pptx
ShailiPal1
 

Similar to Pervasive Computing (20)

Quality Metrics In Ubiquitous Computing
Quality Metrics In Ubiquitous ComputingQuality Metrics In Ubiquitous Computing
Quality Metrics In Ubiquitous Computing
 
Pervasive computing
Pervasive computingPervasive computing
Pervasive computing
 
UBIQUITOUS COMPUTING
UBIQUITOUS COMPUTINGUBIQUITOUS COMPUTING
UBIQUITOUS COMPUTING
 
Ubiqutous Computing
Ubiqutous ComputingUbiqutous Computing
Ubiqutous Computing
 
pervasive-computing-09022014092937-pervasive-computing.ppt
pervasive-computing-09022014092937-pervasive-computing.pptpervasive-computing-09022014092937-pervasive-computing.ppt
pervasive-computing-09022014092937-pervasive-computing.ppt
 
Ubiquitous computing
Ubiquitous computingUbiquitous computing
Ubiquitous computing
 
Ubiquitous Computing
Ubiquitous ComputingUbiquitous Computing
Ubiquitous Computing
 
Ubiquitous computing presentation
Ubiquitous computing presentationUbiquitous computing presentation
Ubiquitous computing presentation
 
Pervasivecomputing 140422034057-phpapp02
Pervasivecomputing 140422034057-phpapp02Pervasivecomputing 140422034057-phpapp02
Pervasivecomputing 140422034057-phpapp02
 
Ubiquitous computing Paper
 Ubiquitous computing Paper Ubiquitous computing Paper
Ubiquitous computing Paper
 
Ubiquitous computing abstract
Ubiquitous computing abstractUbiquitous computing abstract
Ubiquitous computing abstract
 
Ubiquitous computing-and-its-privacy
Ubiquitous computing-and-its-privacyUbiquitous computing-and-its-privacy
Ubiquitous computing-and-its-privacy
 
Ubiquitous computing-and-its-privacy
Ubiquitous computing-and-its-privacyUbiquitous computing-and-its-privacy
Ubiquitous computing-and-its-privacy
 
Introduction uc
Introduction ucIntroduction uc
Introduction uc
 
Towards Pervasive Computing Environments With Cloud Services
Towards Pervasive Computing Environments With Cloud ServicesTowards Pervasive Computing Environments With Cloud Services
Towards Pervasive Computing Environments With Cloud Services
 
Pervasive computing
Pervasive computingPervasive computing
Pervasive computing
 
WEARABLE COMPUTER.pptx
WEARABLE COMPUTER.pptxWEARABLE COMPUTER.pptx
WEARABLE COMPUTER.pptx
 
Ubiquitous Computing
Ubiquitous ComputingUbiquitous Computing
Ubiquitous Computing
 
Presentation1.pptx
Presentation1.pptxPresentation1.pptx
Presentation1.pptx
 
Presentation1.pptx
Presentation1.pptxPresentation1.pptx
Presentation1.pptx
 

Recently uploaded

What’s New in Teams Calling, Meetings and Devices May 2024
What’s New in Teams Calling, Meetings and Devices May 2024What’s New in Teams Calling, Meetings and Devices May 2024
What’s New in Teams Calling, Meetings and Devices May 2024
Stephanie Beckett
 
Active Inference is a veryyyyyyyyyyyyyyyyyyyyyyyy
Active Inference is a veryyyyyyyyyyyyyyyyyyyyyyyyActive Inference is a veryyyyyyyyyyyyyyyyyyyyyyyy
Active Inference is a veryyyyyyyyyyyyyyyyyyyyyyyy
RaminGhanbari2
 
20240702 QFM021 Machine Intelligence Reading List June 2024
20240702 QFM021 Machine Intelligence Reading List June 202420240702 QFM021 Machine Intelligence Reading List June 2024
20240702 QFM021 Machine Intelligence Reading List June 2024
Matthew Sinclair
 
Pigging Solutions Sustainability brochure.pdf
Pigging Solutions Sustainability brochure.pdfPigging Solutions Sustainability brochure.pdf
Pigging Solutions Sustainability brochure.pdf
Pigging Solutions
 
20240702 Présentation Plateforme GenAI.pdf
20240702 Présentation Plateforme GenAI.pdf20240702 Présentation Plateforme GenAI.pdf
20240702 Présentation Plateforme GenAI.pdf
Sally Laouacheria
 
How RPA Help in the Transportation and Logistics Industry.pptx
How RPA Help in the Transportation and Logistics Industry.pptxHow RPA Help in the Transportation and Logistics Industry.pptx
How RPA Help in the Transportation and Logistics Industry.pptx
SynapseIndia
 
BLOCKCHAIN FOR DUMMIES: GUIDEBOOK FOR ALL
BLOCKCHAIN FOR DUMMIES: GUIDEBOOK FOR ALLBLOCKCHAIN FOR DUMMIES: GUIDEBOOK FOR ALL
BLOCKCHAIN FOR DUMMIES: GUIDEBOOK FOR ALL
Liveplex
 
Understanding Insider Security Threats: Types, Examples, Effects, and Mitigat...
Understanding Insider Security Threats: Types, Examples, Effects, and Mitigat...Understanding Insider Security Threats: Types, Examples, Effects, and Mitigat...
Understanding Insider Security Threats: Types, Examples, Effects, and Mitigat...
Bert Blevins
 
Best Programming Language for Civil Engineers
Best Programming Language for Civil EngineersBest Programming Language for Civil Engineers
Best Programming Language for Civil Engineers
Awais Yaseen
 
The Increasing Use of the National Research Platform by the CSU Campuses
The Increasing Use of the National Research Platform by the CSU CampusesThe Increasing Use of the National Research Platform by the CSU Campuses
The Increasing Use of the National Research Platform by the CSU Campuses
Larry Smarr
 
Measuring the Impact of Network Latency at Twitter
Measuring the Impact of Network Latency at TwitterMeasuring the Impact of Network Latency at Twitter
Measuring the Impact of Network Latency at Twitter
ScyllaDB
 
WPRiders Company Presentation Slide Deck
WPRiders Company Presentation Slide DeckWPRiders Company Presentation Slide Deck
WPRiders Company Presentation Slide Deck
Lidia A.
 
論文紹介:A Systematic Survey of Prompt Engineering on Vision-Language Foundation ...
論文紹介:A Systematic Survey of Prompt Engineering on Vision-Language Foundation ...論文紹介:A Systematic Survey of Prompt Engineering on Vision-Language Foundation ...
論文紹介:A Systematic Survey of Prompt Engineering on Vision-Language Foundation ...
Toru Tamaki
 
Scaling Connections in PostgreSQL Postgres Bangalore(PGBLR) Meetup-2 - Mydbops
Scaling Connections in PostgreSQL Postgres Bangalore(PGBLR) Meetup-2 - MydbopsScaling Connections in PostgreSQL Postgres Bangalore(PGBLR) Meetup-2 - Mydbops
Scaling Connections in PostgreSQL Postgres Bangalore(PGBLR) Meetup-2 - Mydbops
Mydbops
 
Paradigm Shifts in User Modeling: A Journey from Historical Foundations to Em...
Paradigm Shifts in User Modeling: A Journey from Historical Foundations to Em...Paradigm Shifts in User Modeling: A Journey from Historical Foundations to Em...
Paradigm Shifts in User Modeling: A Journey from Historical Foundations to Em...
Erasmo Purificato
 
Mitigating the Impact of State Management in Cloud Stream Processing Systems
Mitigating the Impact of State Management in Cloud Stream Processing SystemsMitigating the Impact of State Management in Cloud Stream Processing Systems
Mitigating the Impact of State Management in Cloud Stream Processing Systems
ScyllaDB
 
Password Rotation in 2024 is still Relevant
Password Rotation in 2024 is still RelevantPassword Rotation in 2024 is still Relevant
Password Rotation in 2024 is still Relevant
Bert Blevins
 
How to Build a Profitable IoT Product.pptx
How to Build a Profitable IoT Product.pptxHow to Build a Profitable IoT Product.pptx
How to Build a Profitable IoT Product.pptx
Adam Dunkels
 
What's New in Copilot for Microsoft365 May 2024.pptx
What's New in Copilot for Microsoft365 May 2024.pptxWhat's New in Copilot for Microsoft365 May 2024.pptx
What's New in Copilot for Microsoft365 May 2024.pptx
Stephanie Beckett
 
7 Most Powerful Solar Storms in the History of Earth.pdf
7 Most Powerful Solar Storms in the History of Earth.pdf7 Most Powerful Solar Storms in the History of Earth.pdf
7 Most Powerful Solar Storms in the History of Earth.pdf
Enterprise Wired
 

Recently uploaded (20)

What’s New in Teams Calling, Meetings and Devices May 2024
What’s New in Teams Calling, Meetings and Devices May 2024What’s New in Teams Calling, Meetings and Devices May 2024
What’s New in Teams Calling, Meetings and Devices May 2024
 
Active Inference is a veryyyyyyyyyyyyyyyyyyyyyyyy
Active Inference is a veryyyyyyyyyyyyyyyyyyyyyyyyActive Inference is a veryyyyyyyyyyyyyyyyyyyyyyyy
Active Inference is a veryyyyyyyyyyyyyyyyyyyyyyyy
 
20240702 QFM021 Machine Intelligence Reading List June 2024
20240702 QFM021 Machine Intelligence Reading List June 202420240702 QFM021 Machine Intelligence Reading List June 2024
20240702 QFM021 Machine Intelligence Reading List June 2024
 
Pigging Solutions Sustainability brochure.pdf
Pigging Solutions Sustainability brochure.pdfPigging Solutions Sustainability brochure.pdf
Pigging Solutions Sustainability brochure.pdf
 
20240702 Présentation Plateforme GenAI.pdf
20240702 Présentation Plateforme GenAI.pdf20240702 Présentation Plateforme GenAI.pdf
20240702 Présentation Plateforme GenAI.pdf
 
How RPA Help in the Transportation and Logistics Industry.pptx
How RPA Help in the Transportation and Logistics Industry.pptxHow RPA Help in the Transportation and Logistics Industry.pptx
How RPA Help in the Transportation and Logistics Industry.pptx
 
BLOCKCHAIN FOR DUMMIES: GUIDEBOOK FOR ALL
BLOCKCHAIN FOR DUMMIES: GUIDEBOOK FOR ALLBLOCKCHAIN FOR DUMMIES: GUIDEBOOK FOR ALL
BLOCKCHAIN FOR DUMMIES: GUIDEBOOK FOR ALL
 
Understanding Insider Security Threats: Types, Examples, Effects, and Mitigat...
Understanding Insider Security Threats: Types, Examples, Effects, and Mitigat...Understanding Insider Security Threats: Types, Examples, Effects, and Mitigat...
Understanding Insider Security Threats: Types, Examples, Effects, and Mitigat...
 
Best Programming Language for Civil Engineers
Best Programming Language for Civil EngineersBest Programming Language for Civil Engineers
Best Programming Language for Civil Engineers
 
The Increasing Use of the National Research Platform by the CSU Campuses
The Increasing Use of the National Research Platform by the CSU CampusesThe Increasing Use of the National Research Platform by the CSU Campuses
The Increasing Use of the National Research Platform by the CSU Campuses
 
Measuring the Impact of Network Latency at Twitter
Measuring the Impact of Network Latency at TwitterMeasuring the Impact of Network Latency at Twitter
Measuring the Impact of Network Latency at Twitter
 
WPRiders Company Presentation Slide Deck
WPRiders Company Presentation Slide DeckWPRiders Company Presentation Slide Deck
WPRiders Company Presentation Slide Deck
 
論文紹介:A Systematic Survey of Prompt Engineering on Vision-Language Foundation ...
論文紹介:A Systematic Survey of Prompt Engineering on Vision-Language Foundation ...論文紹介:A Systematic Survey of Prompt Engineering on Vision-Language Foundation ...
論文紹介:A Systematic Survey of Prompt Engineering on Vision-Language Foundation ...
 
Scaling Connections in PostgreSQL Postgres Bangalore(PGBLR) Meetup-2 - Mydbops
Scaling Connections in PostgreSQL Postgres Bangalore(PGBLR) Meetup-2 - MydbopsScaling Connections in PostgreSQL Postgres Bangalore(PGBLR) Meetup-2 - Mydbops
Scaling Connections in PostgreSQL Postgres Bangalore(PGBLR) Meetup-2 - Mydbops
 
Paradigm Shifts in User Modeling: A Journey from Historical Foundations to Em...
Paradigm Shifts in User Modeling: A Journey from Historical Foundations to Em...Paradigm Shifts in User Modeling: A Journey from Historical Foundations to Em...
Paradigm Shifts in User Modeling: A Journey from Historical Foundations to Em...
 
Mitigating the Impact of State Management in Cloud Stream Processing Systems
Mitigating the Impact of State Management in Cloud Stream Processing SystemsMitigating the Impact of State Management in Cloud Stream Processing Systems
Mitigating the Impact of State Management in Cloud Stream Processing Systems
 
Password Rotation in 2024 is still Relevant
Password Rotation in 2024 is still RelevantPassword Rotation in 2024 is still Relevant
Password Rotation in 2024 is still Relevant
 
How to Build a Profitable IoT Product.pptx
How to Build a Profitable IoT Product.pptxHow to Build a Profitable IoT Product.pptx
How to Build a Profitable IoT Product.pptx
 
What's New in Copilot for Microsoft365 May 2024.pptx
What's New in Copilot for Microsoft365 May 2024.pptxWhat's New in Copilot for Microsoft365 May 2024.pptx
What's New in Copilot for Microsoft365 May 2024.pptx
 
7 Most Powerful Solar Storms in the History of Earth.pdf
7 Most Powerful Solar Storms in the History of Earth.pdf7 Most Powerful Solar Storms in the History of Earth.pdf
7 Most Powerful Solar Storms in the History of Earth.pdf
 

Pervasive Computing

  • 2. INTRODUCTION GOALS OF PERVASIVE COMPUTING LAYERS IN PERVASIVE COMPUTING PRINCIPLES OF PERVASIVE COMPUTING VISIONS AND CHALLENGE DIFFERENCE BETWEEN UBIQUITOUS AND PERVASIVE COMPUTING APPLICATIONS BENEFITS LIMITATIONS CONCLUSION SYNOPSIS
  • 3. • Pervasive computing (also called ubiquitous computing) is the growing trend towards embedding microprocessors in everyday objects so they can communicate information. The words pervasive and ubiquitous mean "existing everywhere." Pervasive computing devices are completely connected and constantly available. • Pervasive computing relies on the convergence of wireless technologies, advanced electronics and the Internet. The goal of researchers working in pervasive computing is to create smart products that communicate unobtrusively. The products are connected to the Internet and the data they generate is easily available.
  • 4. The idea that technology is moving beyond the personal computer to everyday devices with embedded technology and connectivity as computing devices become progressively smaller and more powerful. Also called ubiquitous computing, pervasive computing is the result of computer technology advancing at exponential speeds - - a trend toward all man-made and some natural products having hardware and software.
  • 5. GOAL OF PERVASIVE COMPUTING Pervasive computing goes beyond the realm of personal computers: it is the idea that almost any device, from clothing to tools to appliances to cars to homes to the human body to your coffee mug, can be imbedded with chips to connect the device to an infinite network of other devices. The goal of pervasive computing, which combines current network technologies with wireless computing, voice recognition, Internet capability and artificial intelligence, is to create an environment where the connectivity of devices is embedded in such a way that the connectivity is unobtrusive and always available.
  • 7. Layer 1: task management layer  Monitors user task, context and index  Map user's task to need for the services in the environment  To manage complex dependencies Layer 2: environment management layer  To monitor a resource and its capabilities  To map service need, user level states of specific capabilities Layer 3: environment layer  To monitor a relevant resource  To manage reliability of the resources
  • 9. VISIONS AND CHALLENGE The essence of that vision was the creation of environments saturated with computing and communication capability, yet gracefully integrated with human users. When articulated, this was a vision too far ahead of its time — the hardware technology needed to achieve it simply did not exist.
  • 10. • Ubiquitous means everywhere. Pervasive means "diffused throughout every part of." In computing terms, those seem like somewhat similar concepts. Ubiquitous computing would be everywhere, and pervasive computing would be in all parts of your life. • That might mean the difference between seeing kiosks on every street corner and finding that you could -- or need to -- use your Palm handheld to do absolutely every information-based task. • And, in fact, that's where the difference between these two types of computing lies. Pervasive computing involves devices like handhelds -- small, easy-to-use devices -- through which we'll be able to get information on anything and everything. That's the sort of thing that Web-enabled cell phones promise. Ubiquitous computing, though, eschews our having to use computers at all. Instead, it's computing in the background, with technology embedded in the things we already use. That might be a car navigation system that, by accessing satellite pictures, alerts us to a traffic jam ahead, or an oven that shuts off when our food is cooked. Pervasive describes things that spread through a place to become established everywhere. Ubiquitous describes things that are everywhere in a place because it is the nature of that place to have those ubiquitous things.
  • 12. BENEFITS  INVISIBLE: “Smart” environments will be embedded with computing technologies that will be mostly out-of-sight.  SOIALIZATION: “Smart” buildings will illicit a more social response from occupants as computers user interfaces embed themselves within architecture.  DECISION-MAKING: “Smart” environments will help occupants to make better choices as they go about their everyday lives.  EMERGENT BEHAVIOR: Buildings are now becoming more and more kinetic in form and function. Their movements and constructed designs come together dynamically to yield behaviours that make them more adaptive.  INFORMATION PROCESSING: Architecture will go from crunching data to making sense of data; therefore, eliminating our need to constantly input adjustments.  ENHANCING EXPERIENCE: As computers ubiquitously embed themselves in our environments, sensors and actuators will create “smart” environments where architecture space will be goal oriented.  CONVERGENCE: Much of our environment will be supplemented with interconnected digital technologies.
  • 13. LIMITATIONS  Not entirely secure  Frequent line connections that are broken  Slow connections  Very expensive operating costs