computers everywhere

21
Pervasive Pervasive computing computing

Upload: shannon-ross

Post on 27-Dec-2015

37 views

Category:

Documents


0 download

DESCRIPTION

Pervasive computers everywhere

TRANSCRIPT

Page 1: Computers Everywhere

Pervasive Pervasive computingcomputing

Page 2: Computers Everywhere

Advances in technology allow us to embed computing power into smaller and smaller devices. Ubiquitous computing explores the new possibilities afforded by the fusion of computers with everyday objects. This talk will take a brief look at the foundations of pervasive computing, and lots more….

Computers EverywherePervasive Computing

Page 3: Computers Everywhere

What is Pervasive Computing? Technology View Computers everywhere – embedded into

fridges, washing machines, door locks, cars, furniture, people.

intelligent environment Mobile portable computing devices Wireless communication – seamless

mobile/fixed

User View Invisible – implicit interaction with your

environment Augmenting human abilities in context of tasks

Ubiquitous = mobile computing + intelligentenvironment

Page 4: Computers Everywhere

DefinitionsPost-desktop model of human-computer

interaction in which information processing has been thoroughly integrated into everyday objects and activities.

Ubiquitous computing, or calm technology, is a paradigm shift where technology becomes

virtually invisible in our lives.

All models of ubiquitous computing share a vision of small, inexpensive, robust networked processing devices, distributed at all scales throughout everyday life.

Page 5: Computers Everywhere

Bill Gates home

Page 6: Computers Everywhere

Fictional Technologies in SPY KIDS

Page 7: Computers Everywhere

Intelligent EnvironmentLights, air conditioning, TV automatically switch on

and off when you enter or leave rooms.

Sit on your favourite chair and TV switches on to the program you usually watch at this time of the day.

Use communicator/pda for phone, remote control, keys payments, passport, health records, authenticator.

Route input from ‘virtual’ keyboard to nearest suitable display.

Automatic detection of new items to control and physical

layout in a room or office, using computer vision.

Page 8: Computers Everywhere

Mobile Computing Vision

Universal connectivity – anywhere, anytime

Accommodate heterogeneity of networks and communicators

Ubiquitous intelligent environment – embedded computers everywhere

Easy user interaction Context independent access to services +

context dependent informationImagine Having a SINGLE remote to control

all your Electronic Gadgets.

Page 9: Computers Everywhere

Essential Technologies for Pervasive Computing• Hardware

technologiesmicrocontrollers …(Wireless)

networkingSensors, actuatorsPowerPotentially:

entirely new technologies (optoelectronics)

• Software technologies

Operating environments

NetworkingMiddlewarePlatform

technologiesUser interfaces

Page 10: Computers Everywhere

Sentilla SoftwareSentilla Point- Java-Powered software

platform Contains - operating system, virtual

machine and system libraries.

Sentilla Work, - Eclipse-based IDEcreating simple and easy programs.

Sentilla Server, PC-class software that enables the pervasive computers in the network to connect to your enterprise infrastructure

Page 11: Computers Everywhere

Sentilla

Page 12: Computers Everywhere

Sentilla HardwareSentilla Mini core of pervasive

computing solution.Combining MSP430 microcontroller

with a TI/Chipcon CC2420 low-power wireless radio.

Design flexible and scalable.Mini pre-bundled with Sentilla Point

(the world’s only Java-compliant software platform for pervasive computers.)

Page 13: Computers Everywhere

Genre of product solutions

Energy management.Safety and security.Logistics and asset

management.

Page 14: Computers Everywhere

Sentilla Labs

Bite-sized versions of large-scale industry applications. Project refrigerator monitor.

Developer applications and prototype hardware.Project Motion DetectorUses a Radio Shack infrared detector to alert you when there's movement.

Fun applications. Project classic, Pong.

Page 15: Computers Everywhere

Challenge: Social IssuesControl: who watches the watchers, what

is being recorded, who has access and when

Security of informationPrivacy concernsTransparency of computer actions (or

lack thereof)Legal implications of enabling

technology

Page 16: Computers Everywhere

Make computers security “conscious”, minimise user intervention

Establish strong identity Goal: Cryptographically strong identity to

devices (endpoints) Means: Host Identity Protocol (HIP)

Assign and manage trust and authority Goal: Decentralised means for managing

authorisation Means: SPKI certificates

Page 17: Computers Everywhere

Public keys

Page 18: Computers Everywhere

Trust in pervasive computing environments

Page 19: Computers Everywhere

Yesterday's Computers Filled Rooms …

Page 20: Computers Everywhere

… So Will Tomorrow’s

Page 21: Computers Everywhere

References

• http://researchweb.watson.ibm.com/journal/sj/384/ark.html

• http://www.sentilla.com/• http://www.percom.org/• http://www.youtube.com/watch?v=KsKne-fw-X0• http://www.computer.org/portal/site/ieeecs/