Escolar Documentos
Profissional Documentos
Cultura Documentos
1
ubiquitous network infrastructure. Pervasive Computing aims to make our lives simpler
through the use of tools that allow us to manage information easily. These "tools" are a
new class of intelligent, portable devices that allow the user to plug into Powerful
networks and gain direct, simple, and secure access to both relevant information and
services. Pervasive Computing devices are not personal computers as we tend to think of
them, but very tiny - even invisible - devices, either mobile or embedded in almost any
type of object imaginable; all communicating through increasingly interconnected
networks. Information instantly accessible anywhere and anytime is what Pervasive
Computing is all about!
2
Desktop Computers and existing networks, the new devices will have the following
characteristics:
• As described earlier, they will connect to other computing elements without the
direct intervention of users.
• The connections can be expected to be wireless in most cases.
• Many will have small, inexpensive processors with limited memory and little or
no persistent storage.
• The devices themselves will evolve very rapidly. Old technologies will fail and
newer ones will appear much more frequently than at present.
• They will act as terminals for receiving and sending information.
3
technologies, enables us to be more efficient in our work and leaves us more leisure time
and thus Pervasive Computing is fast becoming a part of everyday life.
Pervasive Computing defines a major evolutionary step in work that began in the mid
1970s, when the PC first brought computers closer to people. In Weiser’s vision,
however, the idea of making a computer personal is technologically misplaced. In fact, it
keeps computing separate from our daily life. Although the PC has not delivered the full
potential of information technology to users, it certainly took a first step toward making
computers (if not computing) popular (if not pervasive). It was also an instrumental factor
in the phenomenal growth of hardware components and the development of graphical
user interfaces.
Figure 1.1 System view of pervasive computing. The mobile computing goal of “anytime anywhere”
connectivity is extended to “all the time everywhere” by integrating pervasiveness support technologies
such as interoperability, scalability, smartness, and invisibility.
4
an attractive choice for experimenting with distributed computing concepts. It has also
created a culture that is substantially more amenable to the deployment of Pervasive
Computing environments than the culture that existed when Weiser first articulated his
vision. The ad hoc nature of the Web’s growth has proved that we can distribute
computing capabilities in a big way without losing scalability. The simple mechanisms
for linking resources have provided a means for integrating distributed information bases
into a single structure.
Most importantly, the Web has pioneered the creation of a nearly ubiquitous information
and communications infrastructure. Many users now routinely refer to their point of
presence within the digital world—typically, their homepages, portals, or e-mail
addresses. The computer they use to access these “places” has become largely irrelevant.
Although the Web does not pervade the real world of physical entities, it is nevertheless a
potential starting point for Pervasive Computing.
Mobile computing emerged from the integration of cellular technology with the
Web.4 Both the size and price of mobile devices are falling everyday and could
eventually support Weiser’s vision of pervasive inch-scale computing devices readily
available to users in any human environment. Cellular phone systems that separate the
handset from the subscriber identity module (SIM) card approximate this model of
operation. Subscribers can insert their SIM card and automatically use any handset,
placing and receiving calls as if it were their own phone. Users can already access the
same point in the Web from several different devices—office or home PC, cell phone,
personal digital assistant, and so forth. In this sense, for most users, what matters is the
view a particular machine provides of the digital world. SIM cards also demonstrate that
the end system is becoming less important than the access to the digital world. In this
sense, we are well on
the way to computers “disappearing,” freeing users to focus beyond them. The “anytime
anywhere” goal of mobile computing is essentially a reactive approach to information
access, but it prepares the way for Pervasive Computing proactive “all the time
5
everywhere” goal. As Figure 1 shows, pervasive computing is a superset of mobile
computing. In addition to mobility, pervasive systems require support for interoperability,
scalability, smartness, and invisibility to ensure that users have seamless access to
computing whenever they need it.
6
2 PERVASIVE COMPUTING MODEL
Figure 2.1 Pervasive computing framework. Middleware mediates interactions with the networking kernel
on the user’s behalf and keeps users immersed in the pervasive computing space.
2.1.1 Devices
7
c. Smart devices, such as intelligent appliances, floor tiles with embedded sensors,
and biosensors.
Ideally, Pervasive Computing should encompass every device worldwide that has
built-in active and passive intelligence. The University of Karlsruhe’s MediaCup project
is an experimental deployment of everyday objects activated in this sense. The project’s
guiding principle is to augment objects with a digital presence while preserving their
original appearance, purpose, and use.
Sensors that automatically gather information, transfer it, and take actions based
on it represent an important subset of pervasive devices. For example, sensors based on
the Global Positioning System provide location data that a device can translate into
an internal representation of latitude, longitude, and elevation. Stereo camera vision is
another effective sensor for tracking location and identity in a pervasive environment.
These fast-processing, two-lens digital cameras can record both background images and
background shapes. The results are much more robust for tracking motion such as
gestures.
The number of pervasive devices is expected to multiply rapidly over the next few
years. IDC, a market analysis firm, has predicted that, by the end of 2003, the number of
pervasive devices will exceed the estimated worldwide population of 6 billion people.
Specifically, there will be more than 300 million PDAs; two billion consumer electronic
devices, such as wireless phones, pagers, and set top boxes; and five billion additional
everyday devices, such as vending machines, refrigerators, and washing machines
embedded with chips and connected to a pervasive network.
As a consequence of this proliferation, many current technologies must be
revamped. In addition to extending the backbone infrastructure to meet the anticipated
demand, global networks like the Internet also must modify existing applications to
completely integrate these Pervasive Computing devices into existing social systems.
8
2.1.3 Pervasive middleware
9
3 ISSUES AND CHALLENGES
3.1.1 Scalability
3.1.2 Heterogeneity
10
For networking, developers have faced protocol mismatch problems and learned
how to tackle the large dynamic range of architectural incompatibilities to ensure trans
network interoperability. Mobile computing has already achieved disconnected operation,
thereby hiding the absence of wireless coverage from the user. Middleware may borrow
similar concepts to dynamically compensate for less smart or dumb environments so that
the change is transparent to users.
But the real difficulty lies at the application front. Today, applications are
typically developed for specific device classes or system platforms, leading to separate
versions of the same application for handhelds, desktops, and cluster-based servers. As
heterogeneity increases, developing applications that run across all platforms will become
exceedingly difficult.
3.1.3 Integration
3.1.4 Invisibility
11
a continuous learning cycle for the environment. To meet user expectations continuously,
however, the environment and the objects in it must be able to tune themselves without
distracting users at a conscious level.
A smart environment can implement tuning at different system levels. For
example, network-level devices will require auto configuration. Current manual
techniques for configuring a device with addresses, subnet masks, default gateways, and
so on are too cumbersome and time-consuming for Pervasive Computing. Automated
techniques to dynamically reconfigure the network when required are also crucial to
realizing the Pervasive Computing vision.
Most computing systems and devices today cannot sense their environments and
therefore cannot make timely, context-sensitive decisions Pervasive Computing,
however, requires systems and devices that perceive context. Mobile computing
addresses location- and mobility-management issues but in a reactive context—
responding to discrete events.
Pervasive Computing is more complex because it is proactive. Intelligent environments
are a prerequisite to Pervasive Computing.
Perception, or context-awareness, is an intrinsic characteristic of intelligent
environments. Implementing perception introduces significant complications: location
monitoring, uncertainty modeling, real-time information processing, and merging data
from multiple and possibly disagreeing sensors. The information that defines context
awareness must be accurate; otherwise, it can confuse or intrude on the user experience.
ComMotion, a location-aware computing environment that addresses these issues for
mobile users, is under development at the MIT Media Lab
(www.media.mit.edu/~nmarmas/comMotion.html). Microsoft Research is investigating
Radar, an in building location-aware system.
12
Once a Pervasive Computing system can perceive the current context, it must
have the means of using its perceptions effectively. Richer interactions with users will
require a deeper understanding of the physical space.
Smartness involves accurate sensing (input) followed by intelligent control or
action (output) between two worlds, namely, machine and human. For example, a
Pervasive Computing system that automatically adjusts heating, cooling, and lighting
levels in a room depending on an occupant’s electronic profile must have some form of
perception to track the person and also some form of control to adjust the ventilation and
lighting systems. Pervasive Computing requires systems and devices that perceive
context.
13
4 SECURITY IN PERVASIVE COMPUTING
ENVIRONMENTS
14
4.2.1 Physical Biometrics
a) Fingerprint
b) Hand Geometry
c) Iris patterns
a) Handwriting
b) Signature
c) Speech
d) Gait
a) Perspiration
b) Skin composition(spectroscopy)
15
or stolen. Biometrics are based on established scientific principles as a basis for
authentication.
a) Uniqueness
b) No need to remember passwords or carry tokens
c) Biometrics cannot be lost, stolen or forgotten
d) Security has to be incorporated in the design stage
e) Traditional authentication and access control paradigms cannot scale to
numerous and ubiquitous devices
16
5 Emerging Pervasive Technologies
We've seen science fiction flicks where miniature machines get into the human body and
track cell patterns and behavior like those of cancer cells and exterminate them. Molecule
sized computers can be manufactured to create new materials that can replace steel in all
its properties and even withstand temperatures of 6,500 degree Fahrenheit. It is predicted
that these materials will soon be used to build automobiles and office buildings. 'A la' - an
invisible infrastructure!
Net-ready chips are a low cost method of getting on to the Internet. They follow all the
necessary Internet Protocols and can be embedded in home appliances that can then be
easily connected to the Internet. They function as tags that possess comprehensive
information about the object that it is tagged on to and include details like the date and
place it was manufactured.
17
5.4 Wireless technology
Wireless Internet connection helps access the Net through cellular phones, Personal
Digital Assistants (PDAs) and Wireless laptops and this technology proposes enormous
business opportunities. The sales force can avail real-time access to inventory records;
price lists, order and customer account status and can book a sale almost instantaneously.
Constant communication with wireless gadgets (that cost many degrees lesser than a
laptop) can ensure that there is a constant feedback loop thus ensuring a new way of
reaching customers.
Voice recognition software will soon allow users to switch on their computers by just
talking to them. Even documents can be edited through voice commands. We'll finally be
reaching out to the frontier where man will be able to talk to all his machines and
command them to do as he wishes.
This is a futuristic playground where IBM tests and shows off technology that connects
devices in a seamless computing environment. The entire lab and all its rooms are a
prime example of a web site. The digital images on display in the picture frames on the
living room wall can be controlled remotely. Intelligent countertops in the kitchen
recognize bar code labeled stuff and react accordingly.
5.7 E-web
Embedded devices in cars, refrigerators, shop floors, hospital rooms extend the Internet's
role beyond content providers and shopping assistants to companion and advisors. The
18
Next-Gen web will be more interactive with a swarm of specialized devices like sensors,
and other appliances, all with Internet access and the ability to communicate.
Basically easier computing that's available everywhere as needed, devices that are going
to be easy to use, as simple as calculators and telephones or ATMs. With an extensive
range like mobile commerce to home automation, and from the well-connected car to the
convenience of small devices, Pervasive Computing exemplifies a vision beyond the PC.
Agreed that some of the technologies behind these devices are in their infancy or
evolutionary stages, so it may just be a question of time before all that is promised is
achieved.
Pervasive computing has many potential applications, from health and home care
to environmental monitoring and intelligent transport.
a) Healthcare:
i) records, lab order entry and results reporting (MRIs on the patient's TV)
b) personnel scheduling
iii) Service Industry: "Cable guy will be at your home between 8am and noon." /
GPS
19
v) Micro/Nano devices Hitachi's Mu Chip 0.4mm square, 128 bit ROM,
Interrogated at 2.45GHz, useful for documents, currency, shopping,
preventing "shrinkage"
b) Flight Schedules: Your phone rings. Its the computer at American Airlines. Your
flight departure is delayed by 20 minutes.
e) Home interaction: The networked coffee pot/an alarm clock sync'd with Outlook /
Electricity Peak Conservation/Thermostat/Hot Water Heater connected via
wireless network (security issues)
f) Car: schedule oil change seamlessly w/ garage; maps; traffic; kid movies
streamed to back seat ("Only if its quiet back there")
20
6 FUTURE SHAPE OF PERVASIVE COMPUTING
Today the uses of Internet are limited as its users look for read-mostly information. As
we move to a world where the Internet is used as an infrastructure for embedded
computing, all this will change.
“A COMPUTER on every desk and in every home.” This was Microsoft's mission
statement for many years, and it once sounded visionary and daring. But today it seems
lacking in ambition. What about a computer in every pocket? Sure enough, Microsoft has
recently amended its statement: its goal is now to “empower people through great
software, anytime, anyplace on any device”. Being chained to your desktop is out:
mobility is in !
21
d) Some of the most profound benefits can be expected in the field of health and
medicine. Devices attached to our body, as wristwatches, for example, will
continuously monitor our biological processes, heart rate, blood sugar etc., and
immediately report an abnormality.
e) For the hearing impaired, Amplifiers will be implanted and used in the inner ear.
f) New machines that scan, probe, penetrate and enhance our bodies will be used,
turning us into partial “bionic men”.
g) Devices will become intelligent, for example, cell phones will ask the landline phone
what its telephone number is and will forward our calls to it.
h) Refrigerators will be connected to the Internet so one could find out, via cell phone or
PDA, what is in it while one is at the store. A refrigerator may even sense when it is
low on milk and order more directly from the supplier or rather than this, the
connection will enable the manufacturer to monitor the appliance directly to ensure
that it is working correctly and inform the owner when it is not.
i) Stoves will conspire with the refrigerators to decide what recipe makes the best use of
the available ingredients, then guide us through preparation of the recipe with the aid
of a network-connected food processor and blender. Or they will communicate to
optimize the energy usage in our households.
j) Cars will use the Internet to find an open parking space or the nearest vegetarian
restaurant for their owners or to allow the manufacturer to diagnose problems before
they happen, and either inform the owner of the needed service or automatically
install the necessary (software) repair.
The pervasion of technology in our lives can be expected to have, far-reaching social
consequences. While earlier it was feared that new technology like the Internet would
make us more isolated; as communication devices become more ubiquitous and natural, it
can be expected to actually bring us closer together, thus enriching our social lives. On
the other hand, some people can be expected to show an aversion to what they may
perceive as an invasion of their privacy or personal space.
22
As always, such resistance to anything new is natural and can be expected to
decrease with time. Another aspect to this subject is that of cost. While this may not be
such a critical factor in the developed world, cheaper ways to make the technology more
accessible must be found to help it spread throughout the world.
23
7 CONCLUSION
24
8 References
2. M. Weiser, “The Computer for the 21st Century,” Scientific Am., Sept., 1991, pp. 94-
104; reprinted in IEEE Pervasive Computing, Jan.-Mar. 2002, pp. 19-25.
25