Towards Pervasive Computing: Vandana Dhingra and Tanvi Rustagi

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 4

Towards Pervasive Computing

Towards Pervasive Computing


Vandana Dhingra and Tanvi Rustagi
1 2

Apeejay College of Engineering, Sohna 1 2 E- mail: Vandana_dua_2000@yahoo.com, trustagi@gmail.com

ABSTRACT: Pervasive computing is a new dimension of personal computing that integrates mobile communication, ubiquitous embedded computer system, consumer electronics and power of Internet. It is a rapidly developing area of Information and Communications Technology (ICT). The term refers to the increasing integration of ICT into peoples lives and environments, made possible by the growing availability of microprocessors with inbuilt communications facilities. Pervasive computing has many potential applications, from health and home care to environmental monitoring and intelligent transport systems. In this paper, we have discussed about how pervasive computing is different from traditional computing, its evolution from its predecessor fields, various issues related to pervasive computing and discussed various other research areas that are required to be studied with pervasive computing. KeywordsUbiquitous Computing, Pervasive Computing Systems (PCS), Mobile Computing, Distributed computing, Human-Computer Interaction.

INTRODUCTION

ervasive or Ubiquitous computing has the potential to radically transform the way people interacted with computers [4]. The key idea behind pervasive computing is to deploy a wide variety of computing devices throughout living and working spaces. These devices coordinate with each other and network services with the goal of providing people with universal access to their information and seamlessly assisting them in completing their task. Pervasive computing thus marks a major shift in focus away from the actual computing technology and towards people and their needs, so instead of manually managing their computing environment by for example copying files between devices or converting between data formats user simply access their applications and their data whenever and wherever they need. With its vision of ubiquitous information access, pervasive computing significantly impacts computing devices and their deployment in addition to conventional desktop and server computers, pervasive computing environments encompass many different devices of various sizes and capabilities, including PDA cell phones, video game consoles, robotic dogs. Furthermore, in addition to well -administered and controlled computing server rooms with racks of computers, computing devices are now everywhere, often embedded in places not typically associated with computing, such as living rooms. Laboratories and server rooms with racks of computers, computing devices are not everywhere often embedded in places not typically associated with computing such as living rooms. Pervasive computing systems (PCS) and services may lead to a greater degree of user knowledge of, or control over, the surrounding environment, whether at home, or in an office

or car. They may also show a form of intelligence. For instance, a smart electrical appliance could detect its own impending failure and notify its owner as well as a maintenance company, to arrange a repair. Pervasive computing has been in development for almost 15 years but still remains some way from becoming a fully operational reality. Some core technologies have already emerged, although the development of battery technologies and user interfaces pose particular challenges. It may be another 510 year before complete PCS become widely available [5]. This depends on market forces, industry, public perceptions and the effects of any policy/regulatory frameworks.

WHATS THE DIFFERENC E BETWEEN A TRADITIONAL NETWORKING AND A PERVASIVE COMPUTING?


Rather than using the network to connect computers that are being used directly by people, these appliances communicate over networks such that people do not directly monitor the communication between machines and programs. The majority of these communications will occur in an end -to-end structure that does not include a human at any point. The number of machines connected to the Internet has been increasing at an exponential rate and will continue to grow at this rate as the existing networks of embedded computers, including those that already exist within our automobiles, are connected to the larger, global network, and as new networks of embedded devices are constructed in our homes and offices. The kinds of devices that will be used to access the Internet are no longer confined to desktops and servers, but include small devices with limited user interface facilities (such as cell phones and PDAs); wireless devices with limited bandwidth,

94
computing power, and electrical power; and embedded processors with severe limitations on the amount of memory and computing power available to them. Many of these devices are mobile, changing not only geographic position, but also their place in the topology of the network. Unlike traditional Desktop Computers and existing networks, the new devices will have the following characteristics: 1. Many will have small, inexpensive processors with limited memory and little or no persistent storage. 2. They will connect to other computing elements without the direct intervention of users. 3. Often, they will be connected by wireless networks. 4. They will change rapidly, sometimes by being mobile, sometime by going on and offline at widely varying rates. Over the time, they will be replaced (or fail) far more rapidly than is no common. 5. They will be used s source of information, often sending that information into the center of the network to which they are attached.

Mobile and Pervasive Computing (CoMPC2008)

Distributed Systems
The field of distributed systems arose at the intersection of personal computers and local area networks. The research that followed from the mid-1970 through the early 1990s created a conceptual framework and algorithmic base that has proven to be of enduring value in all work involving two or more computers connected by a networkwhether mobile or static, wired or wireless, sparse or pervasive. This body of knowledge spans many areas. Remote communication, including protocol layering. Remote procedure call, the use of timeouts, and the use of end-to-end arguments in placement of functionality. fault tolerance, including atomic transactions, distributed and nested transactions, and two-phase commit. High availability, including optimistic and pessimistic replica control, mirrored execution, and optimistic recovery . Remote information access, including caching, function shipping, distributed file systems, and distributed databases. Security, including encryption-based mutual authentication and privacy.
Remote communication Protocol layering RPC, end-to- end args Fault tolerance ACID, two- phase commit, nested transactions High Availability Distributed Replication, rollback recovery Systems Remote information access Dist file systems, dist databases, caching Distributed security Encryption mutual authentication Mobile networking Mobile IP, ad hoc networks, wireless TCP fixes Mobile information access Disconnected operation weak consistency Adaptive applications proxies, transcoding agility Energy-aware systems goal- directed adaptation, disk spin -down Location sen sitivity GPS- waved in triangulation context- awareness Smart spaces Mobile Computing Pervasive Computing

EVOLUTION OF PERVASIVE NETWORKING


Pervasive networking is said to be evolved from mobile computing and pervasive computing [8].

Mobile Computing
It was born in the early 1990s with the advent of fullfunction laptop computers and wireless LANs. Although many basic principles of distributed system design continued to apply, four key constraints of mobility forced the development of specialized techniques. These constraints are: (a) unpredictable variation in network quality; (b) lowered trust and robustness of mobile elements; (c) limitations on local resources imposed by weight and size constraints; (d) concern for battery power consumption. Mobile computing is still a very active and evolving field of research, whose body of knowledge awaits codification. The results achieved so far can be grouped into the following broad topics: mobile networking, including Mobile IP, ad -hoc protocols, and techniques for improving mobile information access, including disconnected operation, bandwidth -adaptive file access, and selective control of data consistency. support for adaptative applications, including transcoding by proxies and adaptive resource management system-level energy saving techniques, such as energy aware adaptation, variable-speed processor scheduling, energy -fair ad hoc networking, and energy-sensitive task and memory management location sensitivity, including location sensing and location-aware system behaviour.

Invisibility

Localized scalability Uneven conditioning

Fig. 1: Evolution of Pervasive Computing from Mobile system and Distributed Systems

Towards Pervasive Computing

95
opportunities for data mining activities could be vastly increased with PCS. Data mining involves processing large quantities of data to spot patterns and trends. In terms of consumer data, this can lead to more effective targeted marketing. However, because data mining activities can detect unknown relationships in data, some argue that there is the potential to violate existing legislation. There is debate over how privacy can be protected while still realizing the benefits of pervasive Computing, and whether new legislation will be required. Safety and Security: Pervasive computing also gives rise to debate over safety. Integrated transport systems could involve road vehicles having actuating devices that intervene in the driving process, possibly responding to hazards more quickly than humans. For example, the new Mercedes S -Class features an active braking system that can detect rapidly slowing vehicles in front, activating the brakes without driver intervention. While this may help avoid accidents, there are also potential risks, for example if the security of the vehicles controlling software is breached. Similar concerns exist over prospective PCS applications in domiciliary care. Breaches of security could expose vulnerable individuals to malicious acts within their own homes for example the withholding or overprescribing of medications. Technological Measures: It is argued that privacy, safety and security can be better protected if appropriate procedures and protocols are integrated into PCS at the design level rather than implemented retrospectively. Three measures are frequently cited as vital in establishing robust security measures: the volume of transmitted data should be kept to a minimum; data that require transmission should be encrypted and sent anonymously (without reference to the owner); security should be treated as an ongoing and integral element of PCS. These principles are accepted by many centers of PCS research and development. However, consumer groups such as the NCC say that developers need to give more consideration to privacy issues. The NNC argues that in the case of RFID, 6 privacy issues were considered only late in development and have still not been fully addressed.

ISSUES RELATED TO PERVASIVE COMPUTING


There are engineering problems to be solved before many of the envisaged applications of PCS can become a reality. Moreover, the operation of PCS raises questions over privacy, security, safety and environmental impact. Many of these i sues occur already with ICT such as the Internet s or mobile phones. However the potential ubiquity and integration of PCS into the environment pose additional challenges.

Engineering Issues
The UK Computer Research Center (UKCRC) highlights specific issues including the current lack of low cost technology to locate devices and the lack of suitable power sources. Also the complexity of PCS systems means that their communications, software and hardware are likely to suffer from faults. These might be accident al, or the result of deliberate attempts to damage the system. The National Consumer Council (NCC) suggests there may be questions over liabilityfor example if systems are interconnected it will be harder to establish who is responsible if something goes wrong. The NCC also points out that systems means that their communications, software and hardware are likely to suffer from faults. These might be accidental, or the result of deliberate attempts to damage the system. [3] The National Consumer Council (NCC) suggests there may be questions over liabilityfor example if systems are interconnected it will be harder to establish who is responsible if something goes wrong. The NCC also points out that faulty system may be harder to repair because of the degree of interconnection.

Privacy, Security and Safety


Pervasive computing systems may have implications for privacy, security and safety, as a result of their ability to [2]: gather sensitive data, for example on users' everyday interactions, movements, preferences and attitudes, without user intervention or consent; retrieve and use information from large databases/ archives of stored data; alter the environment via actuating devices. Privacy : With personal information being collected, transmitted and stored in greater volume, the opportunities for data interception, theft and ubiquitous surveillance (official and unofficial) will be heightened. PCS could be embedded in places considered private, such as the home. Data on many aspects of personal life could be recorded and stored, with the risk of breaches of privacy. The advent of pervasive computing may mean that data can be collected without a persons knowledge or consent. Some argue that this could violate existing data protection law [4]. This law also requires that personal data should be collected for a specified purpose only. However the

Environment
While the consumption of natural resources might be reduced through the miniaturization of PCS devices, any gains are likely to be offset by technological proliferation. This may be compounded by problems of treating microelectronic waste embedded in other objects and has implications for recycling because of the possibility of such waste contaminating recycling channels. While some of these issues are likely to be covered by the transposition into UK law of the E Directive on Waste Electrical and C

96
Electronic Equipment, further action (including further regulation) may be required.

Mobile and Pervasive Computing (CoMPC2008)

CONCLUSION
Pervasive computing will be a fertile source of challenging research problems in computer systems for many years to come. Solving these problems will require us to broaden our discourse on some topics, and to revisit long-standing design assumptions in others. We will also have to address research challenges in areas outside computer systems. These areas include human-computer interaction (especially multi-modal interactions and human-centric hardware designs), software agents (with specific relevance to high-level proactive behavior), and expert systems and artificial intelligence (particularly in the areas of decision making and planning). Capabilities from these areas will need to be integrated with the kinds of computer systems capabilities. Pervasive computing will thus be the crucible in which many disjoint areas of research are fused. When describing his vision, Weiser was fully aware that attaining it would require tremendous creativity and effort by many people, sustained over many years. The early decades of the 21 st century will be a period of excitement and ferment, as new hardware technologies converge with research progress on the many fundamental problems discussed in this paper. Like the Frontier of the American West in the early 19th century, pervasive computing offers new beginnings f r the adventurous and the restlessa rich o open space where the rules have yet to be written and the borders yet to be drawn.

Health
Non-ionizing radiation is a by-product of the wireless signals that are likely to be used to connect pervasive computing devices into broader networks. As these devices may be carried close to the body (more so than current ICT) and remain constantly activated, there may be increased risk from exposure of body tissues to the potentially damaging effects of such radiation.

Digital Divide
There is a risk of technological and social isolation for those who do not use the technology (whether it be through choice, lack of income or skills). For instance, banking, education and retail services are likely to be delivered through PCS embedd ed within smart homes; this could lead to some consumers being deprived of access and freedom of choice. Pervasive computing could improve the lives of those with illnesses and disabilities, and the elderly. However, it is widely agreed that in order for these groups to benefit from PCS, their needs and capabilities should be considered from an early stage in the design of the system.

OVERLAP WITH OTHER RESEARCH AREAS

REFERENCES
[1] Towards a Pervasive Computing Benchmark, Anand Ranganathan, Jalal Al-Muhtadi, Jacob Biehl, Brian Ziebart, Roy H. Campbell and Brian Bailey in Proceedings of the 3rd International Conf. on Pervasive Computing and Communications Workshops (PerCom 2005 Workshops). [2] Roy H. Campbell, Jalal Al-Muhtadi, Prasad Naldurg, Geetanjali Sampemane, Dennis Mickunas, M., Towards Security and Privacy for Pervasive Computing,in Proceeding of Third International Conference on Software Reliability. [3] Weiser, M., The Computer for the 21st Century, Scientific Am., Sept., 1991, pp. 94104; reprinted in IEEE Pervasive Computing, JanMar. 2002, pp. 1925. [4] Weiser, M., Hot topics: Ubiquitous computing, IEEE computer, October, 1993. [5] Banavar, G. et al., Challenges: An Application Model for Pervasive Computing, Proc. 6th Ann. ACM/IEEE Intl Conf. Mobile Computing and Networking (Mobicom 2000), ACM P ress, 2000, pp. 266274. [6] Saha, D., A Mukherjee Pervasive Computing: A paradigm for the 21 st Century. IEEE. March, 2003. Published by IEEE. [7] At what cost pervasive? A social computing view of mobile computing systems, Dryer, D.C., Eisbach, C. and Ark, W.S., p. 65 Published in IBM Journal, Volume 38, number, 49, 1999. [8] Satyanarayanan, M. Pervasive Computing: Vision and challenges, IEEE Personal Communication, Aug. 2001, PP. 1017.

Fig. 2: Mobile and pervasive computing overlap with other research areas

Figure 2 presents a broader perspective of the research challenges we face in this area. As this figure shows, mobile and pervasive computing share many research topics with other areas of research. For example, a research project that sits at the intersection of Security and Mobile Computing is Grey. Grey area at inters ection seeks to develop a secure and flexible framework for access control to both physical and virtual resources. In this framework, a user exercises and delegates her authority using her smart phone.

You might also like