Avinashilingam University E-Mail ID

Download as doc, pdf, or txt
Download as doc, pdf, or txt
You are on page 1of 9

Pervasive Computing

Paulin Nancy Pradeepa.P, Kavitha .K , Department of Computer Science, Avinashilingam Institute for Home Science and Higher Education for Women University Coimbatore - 641 043 E-mail ID: [email protected], [email protected]

ABSTRACT There is a wide range of potential benefits for government, service providers and consumers as computing technologies become more pervasive. There is debate over how to address concerns over privacy, security, safety and sustainability while still realizing the benefits of pervasive computing. Such concerns may need to be addressed by means of voluntary guidelines, legislative measures, physical design, or a combination of these. Many say there is a need for greater public debate on the implications of pervasive computing. create an environment where the connectivity of devices is embedded in such a way that the connectivity is unobtrusive Keywords: Computer Research Centre (CRC) , Humanand always available. Pervasive computing is a rapidly developing area of Information and Communications Technology (ICT). The term refers to the increasing integration of ICT into peoples lives and environments made possible by the growing availability of microprocessors with in built communication facilities. Pervasive computing has many potential applications, from health and home care to environmental monitoring and intelligent transport systems. The remainder of this paper is organized as follows. In Section 2 we describe the background and a brief history of pervasive computing. Section 3 discusses the centre for pervasive computing, and Section 4 discusses the various pervasive computing technologies, section 5 describes the applications for pervasive computing, section 6 presents implications of pervasive computing, section 7 presents the conclusions. current network technologies with wireless computing, voice recognition, Internet capability and artificial intelligence, is to

Computer Interactions(HCI) , PDA, Pervasive computing systems (PCs), Information and Communications Technology (ICT), National Consumer Council (NCC) 1.INTRODUCTION Pervasive computing is the next generation computing environments with information & communication technology everywhere, for everyone, at all times. Pervasive computer technology is advancing at exponential speeds -- a trend toward man-made and some natural products having hardware and software. Pervasive computing goes beyond the realm of personal computers: it is the idea that almost any device, from clothing, to tools, to appliances, to cars, to homes, to the human body, to your coffee mug, can be imbedded with chips and connects the device to an infinite network of other devices. The goal of pervasive computing, which combines

Second Wave - Personal computing era: one computer used 2.0 BACKGROUND AND A BRIEF HISTORY OF PERVASIVE COMPUTING. Eight billion embedded microprocessors are produced each year. This number is expected to rise dramatically over the next decade, making electronic devices ever more pervasive. These devices will range from a few millimeters in size (small sensors) to several meters (displays and surfaces). They may be interconnected via wired and wireless technologies into broader, more capable, networks. Pervasive computing systems (PCs) and services may lead to a greater degree of user knowledge of, or control over, the surrounding environment, whether at home, or in an office or car. They may also show a form of intelligence. For instance, a smart electrical appliance could detect its own impending failure and notify its owner as well as a maintenance company, to arrange a repair. Pervasive computing has been in development for almost 15 years but still remains some way from becoming a fully operational reality. Some core technologies have already emerged, although the development of battery technologies and user interfaces pose particular challenges. It may be another five-10 years before complete PCs become widely available. This depends on market forces, industry, public perceptions and the effects of any policy/regulatory frameworks. There have been calls for more widespread debate on the implications of pervasive computing while it is still at an early stage of development. Pervasive computing history Pervasive computing is the third wave of computing technologies to emerge since computers first appeared: First Wave - Mainframe computing era: one computer shared by many people, via workstations. Innovative companies A strong future basis for educating IT specialists. interaction between universities and 3.0 CENTRE FOR PERVASIVE COMPUTING. Information and communication technology will be an integrated part of our environments: from toys, milk cartons and desktops to cars, factories and whole city areas - with integrated processors, sensors, and actuators connected via high-speed networks and combined with new visualization devices ranging from projections directly into the eye to large panorama displays.The centre for pervasive computing contributes to the development of: New concepts, technologies of products and services. by one person, requiring a conscious interaction. Users largely bound to desktop. Third Wave Pervasive (initially called ubiquitous) computing era: one person, many computers. Millions of computers embedded in the environment, allowing technology to recede into the background.

Pervasive computing goes beyond the traditional user interfaces, on the one hand imploding them into small devices and appliances, and on the other hand exploding them onto large-scale walls, buildings and furniture. The activities in the centre are based on competencies from a broad spectrum of Research Areas of relevance for pervasive computing.

Most of the work in the centre is organized as Research Projects involving both companies and universities.

For example, air temperature control is often done with actuators. However, the term can also refer to devices, which deliver information, rather than altering the environment physically. There are many visions for the future development of PCs devices. Several research groups are endeavoring to produce networks of devices that could be small as a grain of sand. The idea is that each one would function independently, with its own power supply, and could communicate wirelessly

4.0 PERVASIVE COMPUTING TECHNOLOGIES.

Pervasive computing involves three converging areas of ICT.

with the others. These could be distributed throughout the environment to form dense, but almost invisible, pervasive computing networks, thus eliminating the need for overt devices.

Computing (devices). Communications (connectivity). User interfaces.

4.2. CONNECTIVITY.

4.1. DEVICES Pervasive computing systems will rely on the inter linking of independent electronic devices into broader networks. This can be achieved via both wired (such as Broadband (Ethernet) PCs devices are likely to assume many different forms and sizes, from handheld units (similar to mobile phones) to nearinvisible devices set into everyday objects (like Furniture and clothing). These will all be able to communicate with each other and act intelligently. Such devices can be separated into three categories: Sensors: input devices that detect environmental changes, user behaviors, human commands etc; Processors: Electronic systems that interpret and analyze input-data; Actuators: output devices that respond to processed information by altering the environment via electronic or mechanical means. User interfaces represent the point of contact between ICT and human users. 4.3. USER INTERFACES and wireless networking technologies (such as WiFi or Bluetooth), with the devices themselves being capable of assessing the most effective form of connectivity in any given scenario. The effective development of pervasive computing systems depends on their degree of interoperability, as well as on the convergence of standards for wired and wireless technologies.

For example with a personal computer, the mouse and keyboard are used to input information, while the monitor usually provides the output. With PCs, new user interfaces are being developed that will be capable of sensing and supplying more information about users, and the broader environment, to the computer for processing. With future user interfaces the input might be visual information for example recognizing a persons face, or responding to gestures. It might also be based on sound, scent or touch recognition, or other sensory information like temperature. The output might also be in any of these formats. The technology could know the user (for example through expressed preferences, attitudes, and behaviors) and tailor the physical environment to meet specific needs and demands. Three very different forms of human-computer interaction are postulated: Pervasive computing could control, overtly or covertly, lives and environments (for example if a device did not have an off-switch or a manual over-ride). Decisions made by developers (such as programming a system in accordance with health and safety regulations), development errors, unintended device interactions and malicious interference could all lead to loss of user control, and could possibly have negative implications for users. Pervasive computing could disappear into the background. People would no longer know they were interacting with computers. The technology would sense and respond to human activity, behavior and demands intuitively and intelligently (for example, lighting altering in reaction to users location, mood and activity).

4.3.3

Coercive Human-Computer Interactions:

4.3.1

Active Human-Computer Interaction.

Users could have overt control over pervasive computing technologies and devices in the environment. This could be achieved through language-based interfaces, allowing users to issue direct spoken or written commands. Digital companions (possibly in the form of smart phones and PDAs) could act as personal, wireless control units for the intelligent environment (activating a home central heating system prior to returning from holiday, for example). Applications in HEALTHCARE, HOME CARE, TRANSPORT ENVIRONMENTAL MONITORING Pervasive computing could have a range of applications, many of which may not yet have been identified. 5.0 APPLICATIONS FOR PERVASIVE COMPUTING

4.3.2

Passive Human-Computer Interaction.

are among the most frequently cited, as discussed below. Research is taking place in industry and academia, often collaboratively, underway. and some government activities are

cheap and, where possible, environmentally sensitive (see Issues). Power is also a challenge, as systems will need to operate over long periods, requiring high levels of energy efficiency and robust energy supplies. While the consumption of natural resources might be reduced through the miniaturization of PCs devices, any gains are likely to be offset by technological proliferation. This may be

5.1. GOVERNMENT INITIATIVES

compounded by problems of treating microelectronic waste embedded in other objects and has implications for recycling because of the possibility of such waste contaminating

The Next Wave Technologies and Markets Program was a government initiative launched in 2001. It was established as virtual interdisciplinary research collaboration dedicated to developing pervasive computing technologies and establishing potential markets. Seven projects have been funded through this initiative, including PCs applications in health care, domiciliary care, integrated home environments, cities/buildings and environmental sensing they are expected to report towards the end of 2006. The UK Foresight Program began a project on Intelligent Infrastructure Systems in September 2004. This project, now entering its final phases, examines how science and pervasive technologies might be applied within modern transport systems.

recycling channels. While some of these issues are likely to be covered by the transposition into UK law of the EC Directive on Waste Electrical and Electronic Equipment, further action (including further regulation) may be required.

5.3. INTELLIGENT TRANSPORT SYSTEMS

Traffic congestion and accidents cost the UK 25 billion a year in lost productivity and wasted energy. Pervasive computing technologies are being employed in the development of intelligent transport systems to try to alleviate these costs. Such systems seek to bring together information and telecommunications technologies in a collaborative scheme to improve the safety, efficiency and productivity of transport networks. Electronic devices could be directly integrated into the transport infrastructure, and into vehicles

5.2. ENVIRONMENTAL MONITORING

Pervasive computing provides improved methods to monitor the environment. It will allow for continuous real time data collection and analysis via remote, wireless devices. However, this poses significant challenges for PCs developers. Devices may be required to withstand harsh environmental conditions (such as heat, cold and humidity). There is also a risk that devices, once deployed, may prove too costly or impractical to recover; thus, they will have to be

themselves, with the aim of better monitoring and managing the movement of vehicles within road, rail, air and sea transport systems. Computers are already incorporated into modern cars via integrated mobile phone systems, parking sensors and complex engine management systems. Intelligent transport systems take this process further by introducing 'intelligent' elements into vehicles. Vehicles could become

capable of receiving and exchanging information on the move via wireless technologies and be able to communicate with devices integrated into transport infrastructure, alerting drivers to traffic congestion, accident hotspots, and road closures. Alternative routes could be relayed to in-car computers, speeding up journey times and reducing road congestion. This would bring added coordination to the road transport system, enabling people and products to travel more securely and efficiently. Greater communication and coordination between different transports sectors (road, rail, air, etc.) may help fulfill integrated transport policies. 5.4. ENGINEERING ISSUES. alter the environment via actuating devices. There are engineering problems to be solved before many of the envisaged applications of PCs can become a reality. Moreover, the operation of PCs raises questions over privacy, security, safety and environmental impact. Many of these issues occur already with ICT such as the Internet or mobile phones. However, the potential ubiquity and integration of PCs into the environment pose additional challenges. The UK Computer Research Centre (UK CRC) highlights specific issues including the current lack of low cost technology to locate devices and the lack of suitable power sources. In addition, the complexity of PCs systems means that their communications, software and hardware are likely to suffer from faults. These might be accidental, or the result of deliberate attempts to damage the system. The National Consumer Council (NCC) suggests there may be questions over liability for example if systems are interconnected, it will be harder to establish who is responsible if something goes wrong. The NCC also points out those faulty systems may be harder to repair because of the degree of interconnection. 6.0. IMPLICATIONS OF PERVASIVE COMPUTING: 6.1. PRIVACY: With personal information being collected, transmitted and stored in greater volume, the opportunities for data interception, theft and ubiquitous surveillance (official and unofficial) will be heightened. PCs could be embedded in places considered private, such as the home. Data on many aspects of personal life could be recorded and stored, with the risk of breaches of privacy. The advent of pervasive computing may mean that data can be collected without a persons knowledge or consent. Some argue that this could violate existing data protection law. This law also requires that personal data should be collected for a specified purpose only. However, the opportunities for data mining activities could be vastly increased with PCs. Data mining involves processing large quantities of data to spot patterns and trends. In terms of consumer data, this can lead to more effective targeted marketing. However, because data mining activities can detect unknown relationships in data, some argue that there is the potential to violate existing legislation. There is debate over how privacy can be protected while still realizing retrieve and use information from large databases/archives of stored data; Privacy, security and safety Pervasive computing systems may have implications for privacy, security and safety, because of their ability to: gather sensitive data for example on users' everyday interactions, movements, preferences and attitudes, without user intervention or consent;

the benefits of pervasive computing, and whether new legislation will be required.

Security Should Be Treated As An Ongoing And Integral Element Of Pcs. Many centers of PCs research and development accept these principles. However, consumer groups such as the NCC say that developers need to consider privacy issues. The NNC argues that in the case of RFID privacy issues were considered only late in development and have still not been fully addressed...

6.2. SECURITY AND SAFETY:

Pervasive computing also gives rise to debate over safety. Integrated transport systems could involve road vehicles having actuating devices that intervene in the driving process, possibly responding to hazards more quickly than humans do. For example, the new Mercedes S-Class features an active braking system that can detect rapidly slowing vehicles in front, activating the brakes without driver intervention. While this may help avoid accidents, there are also potential risks, for example if the security of the vehicle's controlling software is breached. Similar concerns exist over prospective PCs applications in domiciliary care. Breaches of security could expose vulnerable individuals to malicious acts within their own homes for example the withholding or overprescribing of medications. 6.3. TECHNOLOGICAL MEASURES: It is argued that privacy, safety and security can be better protected if appropriate procedures and protocols are integrated into PCs at the design level rather than implemented retrospectively. Three measures are frequently cited as vital in establishing robust security measures. The Volume of Transmitted Data Should be kept to a Minimum Data That Require Transmission Should Be Encrypted And Sent Anonymously (Without Reference To The Owner); Today the uses of Internet are limited as its users look for read-mostly information. As we move to a world where the Internet is used as an infrastructure for embedded computing, all this will change. We can hypothesize that the individual utility of mobile communication, wireless appliances and the respective mobile services - pervasive technologies in general - will be exploited through a digital environment that is 7.0 WHAT IS THIS NEXT GENERATION GOING TO LOOK LIKE? Non-ionizing radiation is a by-product of the wireless signals that are likely to be used to connect pervasive computing devices into broader networks. As these devices may be carried close to the body (more so than current ICT) and remain constantly activated, there may be increased risk from exposure of body tissues to the potentially damaging effects of such radiation. 6.4. HEALTH

Aware of their presence

Sensitive, adaptive and responsive to their needs, habits and emotions And ubiquitously accessible via natural interaction. Increasingly, many of the chips around us will sense

Cars will use the Internet to find an open parking space or the nearest vegetarian restaurant for their owners or to allow the manufacturer to diagnose problems before they happen, and either inform the owner of the needed service or automatically install the necessary (software) repair.

their environment in rudimentary but effective ways. For Example Cell phones will ask the landline phone what its telephone number is and will forward our calls to it. Remote computers will monitor our health statistics and will determine when one is in trouble and will take appropriate action for rescue. Amplifiers will be implanted and used in the inner ear. New machines that scan, probe, penetrate and enhance our bodies will be used. Refrigerators will be connected to the Internet so one could find out, via cell phone or PDA, what is in it while one is at the store. A refrigerator may even sense when it is low on milk and order more directly from the supplier or rather than this, the connection will enable the manufacturer to monitor the appliance directly to ensure that it is working correctly and inform the owner when it is not.

Wrist watches will monitor our sugar. Digi-tickers or implanted heart monitors in heart patients will talk wirelessly to computers, which will be trained to keep an eye open for abnormalities.

In a nutshell, our personal network will travel around with us like a surrounding bubble, connecting to the environment through which we move and allowing our mobile tools to provide us with more functionality than they ever could alone.

7.1 ENGINEERING ISSUES The UK Computer Research Centre (UKCRC) highlights specific issues including the current lack of low cost technology to locate devices and the lack of suitable power sources. In addition, the complexity of PCS systems means that their communications, software and hardware are likely to suffer from faults. These might be accidental, or the result of deliberate attempts to damage the system.3 The National Consumer Council (NCC) suggests there may be questions over liability for example if systems are interconnected it will be harder to establish who is responsible if something goes wrong. The NCC also points out those faulty systems may be harder to repair because of the degree of interconnection

Stoves will conspire with the refrigerators to decide what recipe makes the best use of the available ingredients, then guide us through preparation of the recipe with the aid of a network-connected food processor and blender. Alternatively, they will communicate to optimize the energy usage in our households.

8.0 CONCLUSIONS AND DIGITAL DIVIDE.

There is a risk of technological and social isolation for those who do not use the technology (whether it be through choice, lack of income or skills). For instance, banking, education and retail services are likely to be delivered through PCs embedded within smart homes; this could lead to some consumers being deprived of access and freedom of choice. Pervasive computing could improve the lives of those with illnesses and disabilities, and the elderly. However, it is widely agreed that in order for these groups to benefit from PCs, their needs and capabilities should be considered from an early stage in the design of the system.

9.0 REFERENCES [1] Green field, Adam (2006) The dawning age of ubiquitous computing. [2] Hansman, Uwe(2003) Pervasive computing: The mobile word.springer. [3] Jochen Burkhardt (2001) Pervasive computing [4] Dieter Hutter (2004) security in Pervasive computing. [5] Boleslaw k Szymanski. PC & Networking.

You might also like