01-06-2012, 03:25 PM
PERVASIVE COMPUTING
PERVASIVE COMPUTING.pdf (Size: 1.79 MB / Downloads: 63)
Ubiquitous Computing
Ubiquitous, Invisible Computing (Mark Weiser [1]) : Computers disappear into the background.
Computers embedded in walls, in tabletops, and in every day objects
A person might interact with hundreds of computers at a time, each invisibly embedded in the environment and wirelessly communicating with each other.
The “Personal Motor”
Popular at turn of 20th Century
One motor and lots of “peripherals”: washing machine, woodworking tools, sewing machine, grain milling
System of belts and pulleys to distribute motive power
Similar to the PC situation today
Intel, Microsoft like it this way
Pervasive Computing
A computing environment that seamlessly and ubiquitously supports users in accomplishing their tasks and that renders the actual computing devices and technology largely invisible [5].
Environments created when computing power and network connectivity are embedded in virtually every device humans use. Anytime/anywhere, any device, any network, any data [4].
Computation is freely available everywhere, like batteries and power sockets. Anonymous devices, either handheld or embedded in the environment, will bring computation to us, no matter where we are or in what circumstances. These devices will personalize themselves in our presence by finding whatever information and software we need [18].
Pervasive Computing (2)
Device as portal / Application as task / Physical surroundings as computing Environment [2]
- A device is a portal into an application/data space.
- An application is a means by which a user perform a task,
not a piece of software to exploit a device‟s capability.
- The computing environment is the user‟s information-
enhanced physical surroundings, not a virtual space to
store and run software.
Discovery Protocols
“Spontaneous” discovery and configuration of network devices and services
Selection of specific types of service
Low (preferably no) human administrative requirements
Automatically adaptation to mobile and sporadic availability
Interoperability across manufactures and platforms
PERVASIVE COMPUTING.pdf (Size: 1.79 MB / Downloads: 63)
Ubiquitous Computing
Ubiquitous, Invisible Computing (Mark Weiser [1]) : Computers disappear into the background.
Computers embedded in walls, in tabletops, and in every day objects
A person might interact with hundreds of computers at a time, each invisibly embedded in the environment and wirelessly communicating with each other.
The “Personal Motor”
Popular at turn of 20th Century
One motor and lots of “peripherals”: washing machine, woodworking tools, sewing machine, grain milling
System of belts and pulleys to distribute motive power
Similar to the PC situation today
Intel, Microsoft like it this way
Pervasive Computing
A computing environment that seamlessly and ubiquitously supports users in accomplishing their tasks and that renders the actual computing devices and technology largely invisible [5].
Environments created when computing power and network connectivity are embedded in virtually every device humans use. Anytime/anywhere, any device, any network, any data [4].
Computation is freely available everywhere, like batteries and power sockets. Anonymous devices, either handheld or embedded in the environment, will bring computation to us, no matter where we are or in what circumstances. These devices will personalize themselves in our presence by finding whatever information and software we need [18].
Pervasive Computing (2)
Device as portal / Application as task / Physical surroundings as computing Environment [2]
- A device is a portal into an application/data space.
- An application is a means by which a user perform a task,
not a piece of software to exploit a device‟s capability.
- The computing environment is the user‟s information-
enhanced physical surroundings, not a virtual space to
store and run software.
Discovery Protocols
“Spontaneous” discovery and configuration of network devices and services
Selection of specific types of service
Low (preferably no) human administrative requirements
Automatically adaptation to mobile and sporadic availability
Interoperability across manufactures and platforms