pervcom - ItProjects For You

Download Report

Transcript pervcom - ItProjects For You

PRESENTED BY
11-Apr-16
VIJI, S7 CSE
1
INTRODUCTION

Refers to the embedding computers and communication in our
environment.

Idea behind this is to make the computing power disappear in the
environment, but always present when needed.

It involve the interaction, coordination, and cooperation of numerous,
casually accessible, and often invisible computing devices.

Mobile computing and communication are the major
Pervasive computing system.

Prime goal to make human life more simple, safe, and efficient by using
ambient intelligence.

Voice and gesture recognition along with steerable interface make
interactions and use of these devices more user friendly.
11-Apr-16
VIJI, S7 CSE
parts of
2
CURRRENT EMBEDDEDTECHNOLOGY

Embedded technology is the process of introducing computing power to
various appliances.

Based on the functionality and performance requirement Embedded
systems classified as:
i. Stand alone systems:
ii. Real time systems
iii. Networked system
iv. Mobile devices
11-Apr-16
VIJI, S7 CSE
3
PERVASIVE COMPUTING
Explained in two different perspectives:
User view:
 This approach act as method of augmenting human abilities in context
of tasks.
 Provides interaction transparency
Technological view:
 Access to information and software are available everywhere and
anywhere.
 Intended for mobile as well as localized devices.
 Must possess the ability to locate an object or user using provisions
such as GPS.
11-Apr-16
VIJI, S7 CSE
4
DISTRIBUTED COMPUTING
ENVIRONMENT

Creation of an environment saturated with computing and
communication capability, yet gracefully integrated with human users.

This field aroused by the intersection of PC and LAN.

With appearance of wireless LANs, embedded systems for mobile
clients were introduced.

These two laid the foundation for the concept of Pervasive computing.
11-Apr-16
VIJI, S7 CSE
5
Ambient intelligence

Refers to a vision of the future , in which people are empowered by an
electronic environment that is aware of their presence, , and is sensitive
and responsive to their needs.

aims at improving the quality of life by creating the desired atmosphere
and functionality via intelligent, personalized interconnected systems
and services.

It also refers to electronic environment that are sensitive and responsive
to the presence of people.
11-Apr-16
VIJI, S7 CSE
6
Conti………….

It builds on advanced networking technologies, which allow robust, adhoc networks to be formed by a broad range of mobile devices and
other objects

Key characteristics of such environments are:
ubiquity
awareness
intelligence
natural interaction
11-Apr-16
VIJI, S7 CSE
7
DEVELOPMENT OF PERVASIVE COMPUTING AND RELATION BETWEEN
PERVASIVE COMPUTING WITH DISTRIBUTED SYSTEMS AND MOBILE
COMPUTING
11-Apr-16
VIJI, S7 CSE
8
ARCHITECTURE
 Pervasive computing is categorized by a high degree of
heterogeneity.
 So support of mobility and distribution requires open distributed
computing architectures and open protocols.
 Openness means that specifications of architectures and protocols
are public documents developed by neutral organizations
11-Apr-16
VIJI, S7 CSE
9
Conti……
System architecture is designed for performing the services such as:

Automatic discovery or devices added or removed from the network

Addressing scheme and message-transfer service

Lookup service for discovering resources

Posting and receiving local or remote events

Streaming and controlling data streams

Reserving devices and performing scheduled actions

User interaction
11-Apr-16
VIJI, S7 CSE
10
LAYERED ARCHITECTURE
 Network Layer
 Service Discovery Layer
 Service Composition Layer
 Service Execution Layer
 Application Layer
11-Apr-16
VIJI, S7 CSE
11
Dynamic Broker Selection Technique
This approach centers on a procedure of dynamically
selecting a device to be a broker for a single request in the
environment. We describe three distinct features of the Dynamic
Broker Selection Technique.
 Broker Arbitration and Delegation
 Service Integration and Execution
 Fault Recovery
11-Apr-16
VIJI, S7 CSE
12
IMPLEMENTATION
 many middleware technologies that provide a set of application
programming interfaces (APIs) as well as network protocols that
can meet the network requirements.
 It establishes a software platform enabling all devices that form
the network to talk to each other, irrespective of their operating
systems or interface constraints.
 This approach ensures compatibility and standardized access
among all devices.
11-Apr-16
VIJI, S7 CSE
13
Conti……
Main parameters considered during implementation are:
 DEVICE REQUIREMENTS
Device heterogeneity
Device mobility
 COMMUNICATION
 CONTEXT AWARENESS
 ADAPTATION
 STEERABLE INTERFACES
 SECURITY POLICY
11-Apr-16
VIJI, S7 CSE
14
MERITS
 dramatically increased mechanization without much prominent
or visible use of computer infrastructure.
 help people make effective use of computing tools without
requiring the knowledge of complex devices
 gives people convenient access to relevant information stored on
powerful networks, allowing them to easily take action
anywhere, anytime.
11-Apr-16
VIJI, S7 CSE
15
DEMERITS
 Limitations of device size, weight and capabilities and more
numerous.
 Slow expensive connections and so low cost will encourage rapid
replacement.
 It speaks of various styles like event-based , client-server based,
but does not specify which is suitable for embedded software.
11-Apr-16
VIJI, S7 CSE
16
APPLICATIONS OF PERVASIVE
COMPUTING
•
•
•
•
Palm top computers
Smart badges
Electronic books
Gesture recognition
11-Apr-16
•
•
•
•
VIJI, S7 CSE
Wireless protocols
Security
Voice and video over IP
Speech recognition
17
Conti……
Electronic Books
11-Apr-16
Palm top Computers
VIJI, S7 CSE
18
Conti……
Gesture recognition
11-Apr-16
Smart Badges
VIJI, S7 CSE
19
FUTURISTIC PROPOSITIONS AND
CHALLENGES
 Will tie together billions of smart devices to expand connectivity
and human capabilities over a wider area than ever before.
 This hyper-connectivity will shift the internet from the concept
of being ‘anything, anyplace connectivity for everyone’ to
‘connectivity for anything’.
 Other technologies are sure to emerge to support new capabilities
including Smartphone, ambient user interfaces, set-top media
boxes, fixed and wireless networking technologies and
telematics.
11-Apr-16
VIJI, S7 CSE
20
Conti……
The basic challenges going to be faced are:
 Network security: The more things are linked, the easier it
becomes for outsiders to access critical systems and information.
 Managing increased data flows: Sensors, mobile networks, and
wireless networks all use different protocols for communicating
 Costs: Most sensor networks are still being assembled from offthe shelf parts, making them relatively expensive
11-Apr-16
VIJI, S7 CSE
21
CONCLUSION
The trends in pervasive computing are increasing the diversity
and heterogeneity of networks and their constituent devices. Pervasive
computing is expected to bring an explosion in the number of devices in
our local environments. Pervasive computing devices are not personal
computers as we tend to think of them, but very tiny - even invisible devices, either mobile or embedded in almost any type of object
imaginable, including cars, tools, appliances, clothing and various
consumer goods - all communicating through increasingly
interconnected networks. Pervasive computing researchers aim to
understand how to create systems that are pervasively and unobtrusively
embedded in the environment, completely connected, intuitive,
effortlessly portable, and constantly available, that are of social value.
11-Apr-16
VIJI, S7 CSE
22
11-Apr-16
VIJI, S7 CSE
23
11-Apr-16
VIJI, S7 CSE
24