Sei sulla pagina 1di 12

Coimbatore Institute of Engineering and Technology.

Narasipuram, Coimbatore.

PAPER PRESENTATION

ON

PERVASIVE COMPUTING

SUBMITTED BY:

ESAI AMUTHAN.M,
amuthan90@gmail.com.
Ph:9940864484

JAYANTHKUMAR.M
jayanth.sboa@gmail.com

De
pt:CSE
YE
AR:III

1
considerations of head and hand
ABSTRACT: positioning, most computer
Pervasive computing interface design has nothing to
illustrates a world that we are do with physical space. With
moving towards, quite rapidly. very rare exceptions,
The promise of ‘convenience’ conventional computer
implies that islands of interfaces are unaware of the
technologies will soon converge presence, much less the identity,
and simplify life even further. of human beings.Pervasive
We will finally be witness to the Computing argues that existing
long promised shift to operating system abstractions
convergence. Computing will no and services are neither
longer be a monopolizing sufficient nor necessarily
activity that shackles us to our appropriate for a pervasive
desktops. Basically easier computing infrastructure. The
computing that’s available main goal of Pervasive
everywhere as needed, devices Computing is to allow, users to
that are going to be easy to use, interact the environment’s
as simple as calculators and resources seamlessly. Pervasive
telephones or ATMs. Pervasive computing uses a profound
Computing is a shift towards operating system known as
ubiquitous computing systems, “Gaia meta-Operating
Intended to provide an enhanced System”.
living environment with digital Pervasive computing
information and demands far more of our
processing.Pervasive computing networks than ever before. Web
means that it portends for human browsing, video conferencing
kind in the next few years. To and Internet telephony have very
put it simply it is computation different network requirements
that’s freely available than such old Internet
everywhere. Scenarios where all applications like electronic mail
devices are networked, human- and file transfer. Let us consider
centric, communicate and a example “MIT’s Project
interact with each other without Oxygen”, here we describe a
any hiccups; their primary framework for redirecting data
objective being to bestow streams to devices best equipped
quality life to the user. to handle them as users move
A second key difference in the around in a building. For
pervasive computing world is instance, a user moves around,
the importance of physical this system makes it possible for
space. Current computers a sound or video stream to
obviously occupy physical “follow” her, with the stream
space, but this is usually being played at whichever best-
irrelevant. Apart from dealing equipped, available output
with limitations of "screen real device is nearest to her at any
estate" and ergonomic point in time. The key

2
challenges in building this is distributed in wide-area. Not
system involve discovering protocol but agents with well
resources identified by their specified behavior executing in
location and in developing an places in the network can place
architecture that achieves intelligence in the network.
seamless stream redirection. In Agents enhance the autonomy,
this paper We describe how our intelligence, and mobility of
design and implementation software objects and allow them
meets these challenges to perform collective and
distributed tasks across the
network.
Introduction
Pervasive Computing is Agents may be
a shift towards ubiquitous dispatched to nodes across the
computing systems, Intended to routes in a network, and will be
provide an enhanced living responsible for the maintenance
environment with digital of services through the virtual
information and processing. private networks (VPN)
"Things that think created. Maintenance of a VPN
want to link", Nicholas may involve dynamic
Negraponte of MIT Media Labs reconfiguration, rerouting of
is quoted as saying. The doctrine connections, and re-negotiation
of pervasive computing. of QoS targets.
Pervasive computing
means that it portends for human Pervasive Computing
kind in the next few years. To argues that existing operating
put it simply it is computation system abstractions and services
that’s freely available are neither sufficient nor
everywhere. Scenarios where all necessarily appropriate for a
devices are networked, human- pervasive computing
centric, communicate and infrastructure. The main goal of
interact with each other without Pervasive Computing is to
any hiccups; their primary allow, users to interact the
objective being to bestow environment’s resources
quality life to the user. seamlessly. Pervasive
Pervasive computing computing uses a profound
demands far more of our operating system known as
networks than ever before. Web “Gaia meta-Operating
browsing, video conferencing System”.
and Internet telephony have very Let us consider a
different network requirements example “MIT’s Project
than such old Internet Oxygen”, here we describe a
applications like electronic mail framework for redirecting data
and file transfer. streams to devices best equipped
Pervasive Computing to handle them as users move
can be embedded in the around in a building. For
communication medium and it

3
instance, a user moves around, appropriate to which the device
this system makes it possible for is connected
a sound or video stream to MAIN REQUIREMENTS
“follow” her, with the stream 1.CONTEXT
being played at whichever best-
equipped, available output AWARENES.
device is nearest to her at any Context Awareness is the
point in time. The key method of integrating the
challenges in building this information in the device about
system involve discovering the device and its environments.
resources identified by their 2.SERVICE
location and in developing an DISCOVERY
architecture that achieves Service Discovery will
seamless stream redirection. We be seen briefly in the
describe how our design and methodology phase.
implementation meets these
challenges. Methodology
ENVIRONMENT (Real 1.Service Discovery
Service Discovery can
World)
benefit pervasive computing
The environment
environments, where numerous
constitutes the embedded
elements and sensors often
devices and the surroundings.
interacts to achieve the desired
FRONT-END functionality and intelligent. In
Front-End gets data from such environment, self-
the environment and passes data advertisement and peer
to the Back-End tool. It also discovery can enable the
updates the database with the pervasive space to dynamically
current data. This is done in an change and evolve without
user friendly format. major system reengineering.
BACK-END. Service discovery has
Back-End process the come a long way to becoming a
data sent by the front-end, this major standardization and
processed information is development efforts. The front-
updated refers to the knowledge runners of Pervasive computing
base and decides the necessary are:
action. The action to be taken is  Jini,
passed to the front-end which  Universal Plug and Play
then activates the action (UPnP),
module.  INS (Intentional Naming
ACTIONS System),
Actions that may be  Salutation, and Service
taken are giving appropriate Location Protocol
information taking physical 2.QoS, Resource
actions to the environment. Management
After the discovery of

4
The QoS (Quality of prevailing network conditions,
Service) and Resource or to needs of the users.
management is essential in 4.Sensor network
pervasive computing area. A In a typical sensor
broader set of resources may network, the individual sensors
include computation, storage, sample local values
and services from other (measurements) and disseminate
providers as well as bandwidth. information as needed to other
Independencies between sensors and eventually to the
different type of resources, observer. The measurements
service-specific notions of QoS taken by the sensors are discrete
should be considered. The samples of the physical
challenge is to accommodate phenomenon subject to
service-specific qualities of individual sensor measurement
service and resource accuracy as well as location with
management policies for a large respect to the phenomenon.
number of service providers. Sensor networks share
Resource management many of the challenges of
mechanisms should be flexible traditional wireless networks,
so that resource management including limited energy
policies are customizable by available to each node and
applications and service bandwidth-limited, error-prone
providers. channels. However,
3. Network adaptation communication in sensor
The real goal of adaptive networks differs from
networking is to provide good communication in other types of
end-to-end service, where the networks in that it is typically
end points are located in not end-to-end. More
applications. The heterogeneity specifically, the function of the
of the environment can be network is to report information
overcome by tailoring network regarding the phenomenon to
processing to the available the observer who is not
resources.. Without considering necessarily aware of the sensor
the needs of applications and network infrastructure and the
their users, no adaptive solution individual sensors as an end-
at the network level alone can point of communication.
solve the entire problem. Operating System
Adaptive solutions to network
problems embrace many Behind Pervasive
interesting variations: the Computing :
various proxies, active  Wireless Microservers.
networks and intelligent  Background.
agents. All adapt to changing  Possibilities.
conditions specific to the data  How to Implement the
transmission requested, or to Microsevers ?

5
 Connection To Wireless Bluetooth- short-range radio
microserver. technology
 Service Discovery 2 ways to setup connection
 Implementation Options for  User request-searches for all
Distribution of UI to Bluetooth devices in the
Servers. user’s proximity
 Various Implementations.  Discoverable mode-once the
 A Middleware Infrastructure user terminal comes into the
for Active Spaces. proximity of a Bluetooth
o Gaia Overview. device, the terminal is
o Gaia Services. alerted.
o Gaia Security Implementation Options
Service for Distribution of UI to
Wireless Microservers : Servers.
Background: 1. Preprogrammed
Server
 Microserver-a small,
cost-efficient web-server
that is integrated or
plugged directly into a
device
 Nokia and the University
of Dortmund have
created a low-power
wireless microserver Advantages: Minimizes effort
Possibilities: needed from user’s connection
 Real interaction instead of device or by the manufacture
one-way commands being company of the device the
sent from the user. server is connected to
 Location-aware computing Disadvantages: Unnecessary
 Limit the redundancy of cost , may not have the proper
commands amongst multiple UI for the user’s device
devices 2. Server downloads UI
 Provide Internet access to from device
devices without using a PC.
Implementation of the
Microservers ?
 Mobile phone vs. PDA
 Though the PDA may have
more resources, the mobile
phone was selected because
it is more prevalent in
today’s society.
Service Discovery :

6
Advantages: Server is cheaper using a Bluetooth enabled
Disadvantages: Device is more phone.
expensive, Difficult to update UI A Middleware
Infrastructure for Active
3. Server downloads UI Spaces
from Internet using PC  Physical Space is
connection geographical area and
the items contained
within it.
 Active Space context-
aware coordinated
physical space.
Goal:
Allows users to interact the
environment’s resources
seamlessly.
Advantages: Easier to update
Solution:
user interface
Use Gaia meta-operating
Disadvantages: Requires more
system.
effort from the user
4. Server downloads UI Gaia: Overview
from Internet using
mobile phone
Advantages: “One server fits
all”, Advertisements may be
shown to users, Easy to upgrade
UI, generate more profit by
offering a basic UI and a
premium UI
Disadvantages: Cost of air-
time for the mobile phone to
download the UI
Implementations:
 Author implemented a WAP Gaia Kernel: CMC
application to control  Component Management
PowerPoint presentations Core – Manages basic
using a Bluetooth phone. software unit.
 Author implemented a MP3
player play list editor
running on a Bluetooth-
equipped laptop
 Currently software is
available to control a
computer running a Mac OS

7
Gaia Kernel: Services  Component Repository
 Context Service keeps copies of all
 Context File System components. Allows
 Component browsing, storing, and
Repository uploading.
 Event Manager  Event Manager provides
 Presence Service means of communication
using a
 Space Repository
consumer/supplier
 Security Service model.
Gaia Kernel: Presence
Gaia Kernel: Context
Service
Service
 Notifies the active space
 Defines context of the state of the entities
properties and operations
 Supplies events on
that can be performed.
presence channels
 Context providers (kept (different channels for
in registry) – sensors or people,devices,services).
other components
 Software components
which can infer context.
notify their existence
Gaia Kernel: Context File using a ‘heartbeat’ (sent
System at a regular interval).
Two modes of operation:  People are discovered
• File – traditional through sensors.
directory hierarchy Gaia Kernel: Space
• Context – directory Repository & Security
structure based on
 Space Repository
context
(database) keeps track of
 Easier for application to all active
find information on their devices/services
own. available in the space.
Gaia Kernel:  Information is kept in
Component Repository & XML format so that it
Event Manager can be queried easily
Security still in development.

 Uses modules separate


from application to
handle authentication
Gaia Application
Framework
 MVC (Model View
Controller) bad fit for
Gaia.

8
 Gaia MPCC (Model software, running on the user’s
Presentation Controller handheld device, learns of the
Coordinator); user’s location thanks to Cricket
decoupling of hardware and asks INS if there are any
and software. available speakers in that room
that may be used for playing
music. If there are, the user can
select which media file she
wants to play and it will begin
playing in a speaker in the
A Real Time current room.
Application As the user moves to
In this example we another room, the software
present and describe in detail an detects this change and asks INS
architecture for achieving for speakers in the user’s new
application-level stream location; as soon as one is
redirection that enables a user to found, it instructs the new
begin playing a media file and speaker to begin playing the
have the data stream follow her media file from the point where
as she moves from room to the other one left off. As far as
room. We also describe a the user is concerned, the media
working implementation that file has automatically “followed
showcases our architecture’s her” from one room to another.
flexibility.
Our design uses two
technologies to achieve the Framework Components
aforementioned requirements: it Our framework is made
uses the Cricket location up of four components that
support system so that the interact with each other through
system can learn of the user’s well-specified interfaces
physical location wherever she
goes, and it uses the Intentional 1.Media Server: This is the
Naming System (INS) network host where the media files that
resource location system to find are to be played reside. Our
out which speakers or displays system can interact with
are available for use in each unmodified servers (such as web
room. servers or FTP servers), so the
The user carries a media server is actually an
handheld mobile device with external component of the
network connectivity wherever framework. We can use existing
she goes. This handheld device servers as they are, as long as
has attached to it a piece of they support starting a transfer
hardware called a Cricket from any byte offset set. No
listener, which learns of its modification to the server is
location by listening to signals necessary to have it interact with
coming from Cricket beacons the rest of our framework.
installed in every room. Our

9
2.Media Sink: This is where the 2.Physical Location
media files are being played; in Discovery
our previous The first thing that will
example, the speakers are happen when the controller
the media sink. software is run is that the
3.Media Sink Proxy: Since Cricket listener attached to it
actual media sinks will very will inform it of its physical
likely lack computational location Said location is opaque
abilities, we need a piece of to the controller; this means that
software that can communicate it is simply a string of characters
with the rest of the system on that the controller receives but
behalf of the media sink. The need not interpret.
media sink proxy is the piece of
software that is the actual media In general, location
sink’s portal to the rest of the information is simply used to
system. Its duties include figure out which sink proxies are
communicating with the server running in the same location as
to get the stream data and the controller. It is unimportant
sending the data to the sink so exactly what this location string
the media file can be played is or how it is constructed; it
(how this is actually done is suffices only that the location
sink-dependent but ultimately string determined by the
transparent to the rest of the controller matches the one being
framework). announced by the sink proxy.
4.Controller: This is the piece Sink proxies, thus, must also
of software running on the figure out their location
handheld device. Its duties information. In the case of a sink
include finding out its location, proxy, the location information
detecting motion from one (which is also opaque) may be
location to another, and given as a static, non-changing
communication with a sink string (which may be useful if
proxy to initiate a media file the sink proxy is running on a
transfer. desktop computer whose
location is known and fixed).
However, it is also possible to
interface a physical location
system such as Cricket to the
computer where the sink proxy
is running so that its location
may be given by the beacon in
the room.

10
support and pervasive
computing cannot exist without
network infrastructure. That’s
why almost all current pervasive
computing projects assume they
have an active network or
intelligent network as the lower
infrastructure.
Pervasive computing
illustrates a world that we are
moving towards, quite rapidly.
The promise of ‘convenience’
implies that islands of
technologies will soon converge
and simplify life even further.
We will finally be witness to the
3.Announcement of Sink long promised shift to
Resources convergence. Computing will no
When the media sink longer be a monopolizing
proxy software is run, it must activity that shackles us to our
first figure out its location. Once desktops. Basically easier
it does so, it must announce computing that’s available
itself to the network so that it everywhere as needed, devices
may be found by controllers that are going to be easy to use,
interested in initiating a as simple as calculators and
connection. For this purpose, the telephones or ATMs.
sink proxy communicates with a The relationship to
network resource location computation in its pervasive
system such as INS, sending it form will be different from our
an announcement informing it of relationship to its current
its existence and its location computation. The first
information. Other information difference is the explicitness of
should be included in this the computational task.
network announcement; the sink Presently people think in terms
proxy should reveal not only its of performing explicit tasks "on
physical location, but also some the computer"--creating
information the controller may documents, sending e-mail, and
use to contact it, as well as so on. When computation is part
which type of sink it is and the of the environment, this
transport type it accepts. comfortable explicitness will
Conclusion disappear. Individuals will do
Pervasive computing is whatever they normally do:
all about network service move around, use objects, see
because every service in and talk to each other.
pervasive computing A second key difference
environment needs network in the pervasive computing

11
world is the importance of
physical space. Current
computers obviously occupy
physical space, but this is
usually irrelevant. Apart from
dealing with limitations of
"screen real estate" and
ergonomic considerations of
head and hand positioning, most
computer interface design has
nothing to do with physical
space. With very rare
exceptions, conventional
computer interfaces are unaware
of the presence, much less the
identity, of human beings.

Are you ready to


enter in to the world of
digital computing………

Reference

 Hartwig, Stephan, Jan-


Peter Stromann, and
Peter Resch. "Wireless
microservers." IEEE
Pervasive Computing.
Vol. 1

 Roman, Manuel, et al.


"A Middle Infrastructure
for Active
Spaces." IEEE Pervasive
Computing. Vol. 1, No.
4

 MiJeom Kim
University of Texas at Arlington

12

Potrebbero piacerti anche