SlideShare a Scribd company logo
1 of 8
Download to read offline
Technology
Infrastructure For
The Pervasive Vision

‘Does The Technology
Infrastructure Needed To
Implement The Pervasive
Vision Really Exist Yet?’

By Olivia Moran
[www.oliviamoran.me]
About The Author
Olivia Moran is a leading training specialist who
specialises in E-Learning instructional design and is a
certified Moodle expert. She has been working as a
trainer and course developer for 3 years developing and
delivery training courses for traditional classroom,
blended learning and E-learning.




Courses Olivia Moran Has Delivered:
● MOS
● ECDL
● Internet Marketing
● Social Media
● Google [Getting Irish Businesses Online]
● Web Design [FETAC Level 5]
● Adobe Dreamweaver
● Adobe Flash
● Moodle

Specialties:
★Moodle [MCCC Moodle Certified Expert]
★ E Learning Tools/ Technologies [Commercial & Open Source]
★ Microsoft Office Specialist
★ Web Design & Online Content Writer
★ Adobe Dreamweaver, Flash & Photoshop




Page: 3
Technology Infrastructure For The Pervasive Vision: Does It Exist Yet?
© Olivia Moran [www.oliviamoran.me]
1. ABSTRACT
This document will explore the technologies used for pervasiveness in an attempt to determine
whether or not the technology infrastructure needed to implement the pervasive vision is really
there yet. The different hardware and software used by professionals to create pervasive
solutions will be examined. It will focus on the limitations of mobile devices, the operating
systems they will use, Wireless Application Protocol (W.A.P.), Transmission Control Protocol and
the Internet Protocol (TCP/IP). Also examined is the over use of ad hoc solutions. Wireless
networks and protocols as well as the software used for pervasive application development will
be examined. It will illustrate how seamless communication occurs and the role that network
operators and the handover process play in the achievement of this goal. It will consider how a
lack of standards is impacting on the success and growth of the pervasive industry as well as the
issue of user acceptance.


2. INTRODUCTION
According to Kohler and Erdmann (2004), Pervasive Computing is “A vision of future applications
of Information and Communication Technologies (I.C.T) in which highly miniaturized, embedded,
networked microprocessors equipped with sensors will pervade our daily lives”. The word
pervasive means to spread throughout, to permeate or pervade, hence the term pervasive is used
to describe the spreading of computers and other communication devices throughout our
everyday lives. “The vision of Pervasive Computing is built on the assumption that computers will
become part of everyday objects, augmenting them with information services and enhanced
functionality” Hilty et al (2004).

Pervasive computing is becoming a major area of interest. There are now countless numbers of
pervasive devices available, varying in shape, size, functionality and cost. The reduced cost and
size of memory and pervasive devices as well as more powerful and faster processors have made
the growth and acceleration of pervasive computing possible. Pervasive computing has in affect
led to the creation of an entirely new business market and has the potential to alter significantly
the way in which people communicate.

The vision of pervasive computing envisages obtaining your information where you stand, when
you need it and in the format you need it. Reaching such a stage would according to Burkhardt
et al (2002) “Give users the freedom not only to communicate efficiently at any place in the world
but also to access local information as well as information residing on the internet at any place
and at any time” Realising this pervasive vision is a long way off. Hansmann et al (2003)
highlights that “Pervasive applications need to take care of various hardware and software
platforms, as well as very different form factors and user interfaces. This obstacle strongly
impacts portability”.

This paper aims to highlight the extent to which technologies are able to support the pervasive
vision and whether or not the infrastructure that currently exists is sufficient for implementing
this vision. The most commonly used hardware and software available at present for the creation
of pervasive solutions are examined at length. This document is concerned with the limitations of
mobile devices, the operating systems they use, W.A.P. and TCP/IP Protocol.




Page: 4
Technology Infrastructure For The Pervasive Vision: Does It Exist Yet?
© Olivia Moran [www.oliviamoran.me]
Also examined is the over use of ad hoc solutions. Wireless networks and protocols as well as the
software used for pervasive application development will be explored. Network operators and
the role they play in the handover process are also considered and how this process is vital to
seamless communications over different geographical locations. In this paper the different
problems that arise from the lack of standards in the pervasive industry are presented. Lastly, the
issue of user acceptance is considered and how this matter impacts on the development of some
technologies.


3. HARDWARE & SOFTWARE TECHNOLOGIES
“Today’s emerging pervasive computing technology faces serious technical issues: most devices
have strong limitations on memory usage and processor performance as well as tight constraints
on power consumptions” Hansmann et al (2003). There are hundreds of different models of
mobile phones as well as Personal Digital Assistants (P.D.A’s) and numerous platforms that must
be taken into account by the developer when building a suitable user interface. These devices
vary in size, shape and functionality. Each mobile phone requires a different interface that allows
the user to communicate with the computer. Some mobile devices are multimodal, where input
and output is given using more than one modality i.e. pen, voice, touch screen etc. The lack of
standards causes a real problem for developers. There is no one agreed upon standard that all
developers can follow.

3.1 Limitations of Pervasive Devices
Pervasive devices face many limitations that their desktop counterparts do not. Such limitations
relate mainly to reliable power supplies, display sizes and interfaces for input and output,
memory capacity as well as processor power. Portable batteries are used to power pervasive
devices. The life of these batteries once charged will differ depending on the type of battery that
it is. Some of the more desirable batteries include Nickel-Cadmium (NIMH), Lithium Polymer or
the most commonly used Lithium Ion (Li ion). Such batteries are much lighter in weight, smaller
in size and more environmentally friendly than previously used batteries however, they are not
capable of supporting long-term use without needing to recharge.

Pervasive devices usually have a relatively small display and this can cause some major problems
for designers. Forms need to be able to adapt to the specifications of the phone or else they will
display incorrectly. It is very important to consider colour, scale and spacing, as failing to take
these into account will result in a task taking longer to complete. “The screen layout should be
self-explaining and reduced to the absolutely necessary elements” Hansmann et al (2003). The
different input and output i.e. pen based, touch screen, voice etc. modalities of each device must
also be considered in light of the application being developed.

Memory has recently become much more affordable, most likely due to increased demand for
portable devices. Pervasive devices such as camera phones and P.D.A.’s can store a substantial
amount of data with many of these allowing for the attachment of Microdrives like those
developed by IBM. Processing power is another issue that mobile devices must contend with. The
pervasive devices that are in operation today such as a typical smart phone have more processing
capabilities and a higher clock rate than the best computers available two decades ago. With this
said they are still incapable of dealing with huge amounts of data and therefore what needs to
be processed should be kept to a minimum.




Page: 5
Technology Infrastructure For The Pervasive Vision: Does It Exist Yet?
© Olivia Moran [www.oliviamoran.me]
3.2 Operating Systems (O.S.)
The only thing a user is usually concerned about when using a pervasive device is the speed and
length of time that it takes to do a task. They do not wish nor need to know what is going on in
the background. Consequently, “The footprints of Operating Systems and software need to be
reduced as much as possible. Mobile devices must handle power shortages and their applications
must be able to resume again after shutdown” Hansmann et al (2003).

Burkhardt (2002) points out “The core functionality of every pervasive computing device is
determined by its operating system”. This can range from basic functionality like that provided
by the Palm O.S. or those with a lot of complexity such as Windows CE, a powerful O.S. The O.S.
is responsible for tasks such as user, task, power and memory management. It is highly important
that the O.S. chosen for each device is appropriate given its features, capabilities and the tasks
that it must perform.

3.3 Wireless Application Protocol (W.A.P.)
W.A.P. is an Internet protocol that defines “An optimised protocol stack for communication over
wireless lines, an application environment for mobile phone applications, a content description
language, and a miniature browser interface” Burkhardt et al (2002). Contributing to its success
is that “W.A.P. offers a broad market for developers. One worldwide standard that is device-
independent and bearer-independent assures developers of a broad, ever-expanding market for
content and applications” Steenderen (2002). W.A.P. does have some limitations. It does not
deal well with limited bandwidth and the requirements of smaller user interfaces. However, with
the increased availability and more affordable costs of broadband this limitation will be
overcome.

3.4 Transmission Control Protocol and Internet Protocol (TCP/IP)
TCP/IP protocols were designed for wired networks and do not adapt particularly well to wireless
networks. According to Alanko et al (1999) “Differences between wired and wireless links cause
complications. The common data communication protocols, like the TCP/IP Internet protocols, do
not expect problems like those occurring in a cellular telephone network”.

TCP connections often have poor performance as they can misinterpret lost packets as “Network
congestion and slows down the rate of transmission” Alanko et al (1999). Such a belief results in
the TCP layer stopping what it is doing so that it can listen and wait for the congestion to
disappear. This is problematic, as no congestion actually exists and it stops sending the data
packets. The ideal situation would be that it increases packet transmission frequency and speed
as the loss of packets is most likely due to transmission errors caused by changes in the networks
physical layer. Alanko et al (1999) also notes “Multiple TCP connections over a low-bandwidth
link can interfere with each other … Parallel TCP connections competing for the same constrained
link interfere with each other in a way that causes additional retransmissions”.

3.5 Ad Hoc Solutions
Companies are extremely innovative and constantly come up with new ways to use existing
technologies. However “It is now widely acknowledged that the success of pervasive computing
technologies will require a radical design shift, and that it is not sufficient to simply extrapolate
from existing desktop computing technologies” Henricksen et al (2002). While this may be
beneficial in the short term it is creating a wide range of problems in the pervasive computing
industry and has lead to the very messy Internet that we use today.




Page: 6
Technology Infrastructure For The Pervasive Vision: Does It Exist Yet?
© Olivia Moran [www.oliviamoran.me]
Most pervasive devices work on an infrastructure, which at the time of its inception, developers
built without considering modifications and developments that may have been needed in the
future. The construction of the infrastructure in this ad hoc manner creates many problems and
results in changes being expensive and hard to carry out.

3.6 Wireless Networks & Protocols
The position that the pervasive industry finds itself in today is somewhat thanks to the various
technologies most notably IEEE 802.11 upon which WIFI and Bluetooth is based. These are both
protocols that allow connections to be established without any cables. IEEE 802.11 is a standard
used which allows mobile devices or networks to communicate using radio frequencies. While
Wireless Local Area Network (W.L.A.N.) capabilities based on this standard are within the
capabilities of some smart phones it is generally reserved for devices of the gaming industry like
that of the Play Station Portable (PSP). These IEEE 802.11 set of standards are being expanded
and “Perhaps the most important development from a mobile device perspective is the
enhancement of voice handling in 802.11e. It extends the protocol with voice handling
capabilities” Andersson (2006).

Bluetooth as described by Hansmann (2003) is “A standard for a short-range radio frequency
network between devices”. Bluetooth while relatively slow in being adapted, has its success in
the fact that “Bluetooth chipsets are cheap and that they have a protocol stack that makes
information exchange easy” Andersson (2006). It does however have some limitations in that “It
has had difficulties in obtaining user adoption beyond headsets, even tough it made it under the
hood of the mobile device – people find it easier to plug in a USB cable than activate Bluetooth
and connect to another device” Andersson (2006). Companies such as Nokia are trying to create a
demand for Bluetooth devices other than headsets with the creation of devices like their ‘Nokia
Sensor’ a software application for phones that “Offers a new way for people to create
information and share it with other phone users nearby” Andersson (2006).

Rodriguez et al (1999) puts forward the argument that WLAN’s provide “An awesome
opportunity for unprecedented access to information and applications by mobile workers and
professionals”. On the other hand one must also consider the fact that “Limited bandwidth, high
latency, high cost, poor reliability and security risks of wireless networks greatly inhibit
supporting today’s applications over wireless networks”. Privacy remains a major issue for
wireless networks. Signals moving through the air can be easily intercepted and deciphered.
However, users may be willing to surrender some of their privacy if they believe that the benefits
will outweigh this disadvantage.

3.7 Pervasive Application Development Software
Java to micro edition (J2ME) and Microsoft Visual Studio 2005 are technologies that are widely
used to develop pervasive applications for use on mobile devices. The original Java language was
created out of a desire to come up with a language that could be used for the development of
software that would run on any type of hardware. Its basically ‘write once, run anywhere’. It
essentially ensures a greater level of platform independence.

A version of java that could be used on small devices such as smart phones and PDA’s was
developed. This language became known as J2ME. By 2001, a vast amount of mobile phones
supported the use of J2ME and today has evolved into one of the most supported platforms on
small devices. J2ME does however have some limitations. It takes quite a long time to become
proficient with its use, to build applications and these often have slower performance than those
created by other similar technologies.


Page: 7
Technology Infrastructure For The Pervasive Vision: Does It Exist Yet?
© Olivia Moran [www.oliviamoran.me]
Microsoft Visual Studio 2005 is another development environment. It is based on a .Net
framework and like J2ME it has a steep learning curve. On the other hand it allows for the
development of applications in Visual Basic, C++, C# and Visual J# programming languages.


4. NETWORK OPERATORS & HANDOVERS
A major obstacle for the pervasive industry is the achievement of a seamless exchange of users
from one network operator to another. This process needs to result in an “Efficient and cost
effective interworking between overlay networks for the seamless provisioning of current and
future applications and services” Doufexi et al (2004). The device must constantly listen for
changes in network conditions and determine the optimum time for the hand over. If this
procedure is not carried out correctly crucial data packets may be lost.

Different handover models exist to manage this event; the ‘Vertical Handover’ is one such
method. Such a model enables “Users to roam freely between heterogeneous networks while
maintaining the continuity of their applications” Balasubramaniam & Indulska (2003). It is
concerned with context awareness and issues such as “Network disconnections and changes in
network Quality of Service” Balasubramaniam & Indulska (2003).


5. LACK OF STANDARDS
The pervasive industry is currently haunted by lack of standards with interoperability and
standardisation being highly important to its future. Many fail to recognise the significance of
these issues and are unwilling to take the time necessary for the development of standards.
Many developers feel that they cant take the risk of waiting to deploy their product and service.
Those that are first to the market are those who usually gain an early competitive advantage.
Andersson et al (2006) share a similar view arguing that while “Proprietary solutions are always
the fastest way of getting a new technology to market, the result has been fragmentation of
formats”

Organisations such as the World Wide Web Consortium (W3C), Open Mobile Alliance (OMA) and
the Java Community Process (JCP), lay standards down for the pervasive computing industry.
These bodies constantly govern the industry and its growth as well as development. The
utilisation of standards ensures that the various pervasive hardware devices and software
produced are implemented in a satisfactory way. As noted by McGovern & Norton (2002) “A
common standard empowers rather than restricts”. These standards can change from time to
time as pervasive computing is still in its infancy and thus is continually developing and evolving.


6. THE CUSTOMER & USER ACCEPTANCE
Further development of some promising technologies has been halted by high development
costs. While an organisation may be able to produce a pervasive product to satisfy consumer
needs, they often fail to do so in an economic way. Schmidt et al (2006) highlights that “Price still
seems to be the main obstacle for introducing the technologies”. It impacts greatly on gaining
user acceptance.




Page: 8
Technology Infrastructure For The Pervasive Vision: Does It Exist Yet?
© Olivia Moran [www.oliviamoran.me]
For a user to accept the product that is being offered it must be capable of performing its
activities at least the same or better than the desktop does. As Andersson et al (2006) points out
“Customers expect to access the same (or similar) information and applications when on the move
as from their desktops … Ease of use and reliability have always been trademarks and customers
have very little tolerance of a hand-held device that has to be restarted every once in a while”.
Take for example phones with W.A.P. capabilities, these did not take off as expected due to low
user acceptance.

This example aims to highlight that even where the technology may exist to support
pervasiveness it may simple not be used. Drawing on the previous example, users viewed the
W.A.P. enabled phone as offering the same service as their desktops but one which was less
reliable, slower and much more expensive. It is clear to see that other factors such as user
acceptance have a huge impact on the future development and growth of technologies that
could be used to support the pervasive vision.


7. CONCLUSION
This document examined the different hardware and software technologies used by professionals
in the development of pervasive applications and devices in an attempt to determine the extent
to which the pervasive infrastructure is ready to support the true pervasive vision. It focused on
key areas pertaining to the limitations of mobile devices, the operating systems they will use,
W.A.P., TCP/IP Protocol, the over use of ad hoc solutions, wireless networks and protocols as well
as the software used for pervasive application development. It also looked at the role of network
operators and the handover process necessary for seamless communication. It briefly considered
the various problems that developers encounter due to lack of standards. Lastly, the issue of user
acceptance was considered and how this matter can impact on the development of different
technologies.

One of the major problems that the pervasive industry faces at the moment is that instead of
creating new technologies specifically aimed at supporting mobile computing, developers are
instead too focused on modifying existing solutions that were built for wired networks and
desktops. This course of action is extremely time consuming, costly and not always the best way
to approach a particular problem. Grimm et al (2000) argues, “Existing operating system
abstractions and services are neither sufficient nor necessarily appropriate for a pervasive
computing infrastructure”. Developers need to begin thinking outside of the box. Lack of
standards is also contributing somewhat to the problem.

From carrying out extensive research into this area it seems as though the technologies needed to
support the ultimate pervasive vision are not available yet. However, the author does not wish to
underestimate the innovative spirit of those working in the industry and shares the view of
Andersson et al (2006) that “Perhaps advances in the area of pervasive computing will not be
made possible only through the development of new technologies or applications but also
through the re-examination and reengineering of current offerings. People are resourceful and
innovative and have the ability to make the best of what they have”. The author is confident
that the coming years will bring significance advances towards the realisation of the pervasive
vision.




Page: 9
Technology Infrastructure For The Pervasive Vision: Does It Exist Yet?
© Olivia Moran [www.oliviamoran.me]

More Related Content

What's hot

Future Trends of Embedded Systems - Technical Paper Presentation
Future Trends of Embedded Systems - Technical Paper PresentationFuture Trends of Embedded Systems - Technical Paper Presentation
Future Trends of Embedded Systems - Technical Paper PresentationKaushik Gupta
 
Simputer new ppt
Simputer new pptSimputer new ppt
Simputer new pptRama B
 
Touchless Touchscreen
Touchless TouchscreenTouchless Touchscreen
Touchless TouchscreenTasnin Khan
 
Home Automation System using iot
Home Automation System using iotHome Automation System using iot
Home Automation System using iotKowshik Deb
 
Introduction To Embedded Systems
Introduction To Embedded SystemsIntroduction To Embedded Systems
Introduction To Embedded SystemsVishwa Mohan
 
MATLAB Electronics Projects Research Topics
MATLAB Electronics Projects Research  TopicsMATLAB Electronics Projects Research  Topics
MATLAB Electronics Projects Research TopicsMatlab Simulation
 
iot based home automation
iot based home automationiot based home automation
iot based home automationparvathy s m
 
Introduction to Smart Devices
Introduction to Smart DevicesIntroduction to Smart Devices
Introduction to Smart DevicesYong Heui Cho
 
Mobile Devices and Technology
Mobile Devices and TechnologyMobile Devices and Technology
Mobile Devices and TechnologyOishik Sarkar
 
Ppt on six month training on embedded system & IOT
Ppt on six month training on embedded system & IOTPpt on six month training on embedded system & IOT
Ppt on six month training on embedded system & IOTpreetigill309
 
Smart home and internet of things transformation of the existing concept of a...
Smart home and internet of things transformation of the existing concept of a...Smart home and internet of things transformation of the existing concept of a...
Smart home and internet of things transformation of the existing concept of a...iRidiumMobile365
 
Smartsensor 120713051429-phpapp02
Smartsensor 120713051429-phpapp02Smartsensor 120713051429-phpapp02
Smartsensor 120713051429-phpapp02Chakridhar Chakri
 

What's hot (20)

Future Trends of Embedded Systems - Technical Paper Presentation
Future Trends of Embedded Systems - Technical Paper PresentationFuture Trends of Embedded Systems - Technical Paper Presentation
Future Trends of Embedded Systems - Technical Paper Presentation
 
Simputer new ppt
Simputer new pptSimputer new ppt
Simputer new ppt
 
Touchless Touchscreen
Touchless TouchscreenTouchless Touchscreen
Touchless Touchscreen
 
Embedded system seminar
Embedded system seminarEmbedded system seminar
Embedded system seminar
 
Home Automation System using iot
Home Automation System using iotHome Automation System using iot
Home Automation System using iot
 
Personal digital assistants
Personal digital assistantsPersonal digital assistants
Personal digital assistants
 
embedded systems
embedded systemsembedded systems
embedded systems
 
Introduction To Embedded Systems
Introduction To Embedded SystemsIntroduction To Embedded Systems
Introduction To Embedded Systems
 
MATLAB Electronics Projects Research Topics
MATLAB Electronics Projects Research  TopicsMATLAB Electronics Projects Research  Topics
MATLAB Electronics Projects Research Topics
 
PDAs
PDAsPDAs
PDAs
 
Simputer
SimputerSimputer
Simputer
 
iot based home automation
iot based home automationiot based home automation
iot based home automation
 
Introduction to Smart Devices
Introduction to Smart DevicesIntroduction to Smart Devices
Introduction to Smart Devices
 
Mobile Devices and Technology
Mobile Devices and TechnologyMobile Devices and Technology
Mobile Devices and Technology
 
Ppt on six month training on embedded system & IOT
Ppt on six month training on embedded system & IOTPpt on six month training on embedded system & IOT
Ppt on six month training on embedded system & IOT
 
Smart home and internet of things transformation of the existing concept of a...
Smart home and internet of things transformation of the existing concept of a...Smart home and internet of things transformation of the existing concept of a...
Smart home and internet of things transformation of the existing concept of a...
 
Blueeyes 140731120825-phpapp02
Blueeyes 140731120825-phpapp02Blueeyes 140731120825-phpapp02
Blueeyes 140731120825-phpapp02
 
Smartsensor 120713051429-phpapp02
Smartsensor 120713051429-phpapp02Smartsensor 120713051429-phpapp02
Smartsensor 120713051429-phpapp02
 
Touchless Touch screen technology
Touchless Touch screen technologyTouchless Touch screen technology
Touchless Touch screen technology
 
The AirBoard brief
The AirBoard briefThe AirBoard brief
The AirBoard brief
 

Similar to Technology Infrastructure For The Pervasive Vision, Does It Exist Yet?

Introduction to it application
Introduction to it applicationIntroduction to it application
Introduction to it applicationKumar
 
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...Editor IJCATR
 
A Posteriori Perusal of Mobile Computing
A Posteriori Perusal of Mobile ComputingA Posteriori Perusal of Mobile Computing
A Posteriori Perusal of Mobile ComputingEditor IJCATR
 
A Posteriori Perusal of Mobile Computing
A Posteriori Perusal of Mobile ComputingA Posteriori Perusal of Mobile Computing
A Posteriori Perusal of Mobile ComputingEditor IJCATR
 
DESIGN AND IMPLEMENTATION OF INTELLIGENT COMMUNITY SYSTEM BASED ON THIN CLIEN...
DESIGN AND IMPLEMENTATION OF INTELLIGENT COMMUNITY SYSTEM BASED ON THIN CLIEN...DESIGN AND IMPLEMENTATION OF INTELLIGENT COMMUNITY SYSTEM BASED ON THIN CLIEN...
DESIGN AND IMPLEMENTATION OF INTELLIGENT COMMUNITY SYSTEM BASED ON THIN CLIEN...ijasuc
 
DESIGN AND IMPLEMENTATION OF INTELLIGENT COMMUNITY SYSTEM BASED ON THIN CLIEN...
DESIGN AND IMPLEMENTATION OF INTELLIGENT COMMUNITY SYSTEM BASED ON THIN CLIEN...DESIGN AND IMPLEMENTATION OF INTELLIGENT COMMUNITY SYSTEM BASED ON THIN CLIEN...
DESIGN AND IMPLEMENTATION OF INTELLIGENT COMMUNITY SYSTEM BASED ON THIN CLIEN...ijasuc
 
Design and implementation of intelligent community system based on thin clien...
Design and implementation of intelligent community system based on thin clien...Design and implementation of intelligent community system based on thin clien...
Design and implementation of intelligent community system based on thin clien...ijasuc
 
Collation of Mobile operatives
Collation of Mobile operativesCollation of Mobile operatives
Collation of Mobile operativesIJERA Editor
 
1. What is IT infrastructure and what are its components2.What ar.pdf
1. What is IT infrastructure and what are its components2.What ar.pdf1. What is IT infrastructure and what are its components2.What ar.pdf
1. What is IT infrastructure and what are its components2.What ar.pdfexpressionnoveltiesk
 
A Study Mobile Computing
A Study   Mobile ComputingA Study   Mobile Computing
A Study Mobile ComputingSara Alvarez
 
Wearable Computing and Human Computer Interfaces
Wearable Computing and Human Computer InterfacesWearable Computing and Human Computer Interfaces
Wearable Computing and Human Computer InterfacesJeffrey Funk
 
The Improvement and Performance of Mobile Environment using Both Cloud and Te...
The Improvement and Performance of Mobile Environment using Both Cloud and Te...The Improvement and Performance of Mobile Environment using Both Cloud and Te...
The Improvement and Performance of Mobile Environment using Both Cloud and Te...IJwest
 
Developing For The Pervasive Internet Of Things
Developing For The Pervasive Internet Of ThingsDeveloping For The Pervasive Internet Of Things
Developing For The Pervasive Internet Of ThingsVictoria Romero-Gomez
 
Mobile Computing by Tapesh Chalisgaonkar
Mobile Computing by Tapesh ChalisgaonkarMobile Computing by Tapesh Chalisgaonkar
Mobile Computing by Tapesh ChalisgaonkarTapesh Chalisgaonkar
 
Internet technology and web engineering
Internet technology and web engineeringInternet technology and web engineering
Internet technology and web engineeringProfessor Lili Saghafi
 
ICT, Importance of programming and programming languages
ICT, Importance of programming and programming languagesICT, Importance of programming and programming languages
ICT, Importance of programming and programming languagesEbin Robinson
 
IRJET- Voice Controlled Personal Assistant Bot with Smart Storage
IRJET- Voice Controlled Personal Assistant Bot with Smart StorageIRJET- Voice Controlled Personal Assistant Bot with Smart Storage
IRJET- Voice Controlled Personal Assistant Bot with Smart StorageIRJET Journal
 
Common protocol to support disparate communication types within industrial Et...
Common protocol to support disparate communication types within industrial Et...Common protocol to support disparate communication types within industrial Et...
Common protocol to support disparate communication types within industrial Et...Maurice Dawson
 

Similar to Technology Infrastructure For The Pervasive Vision, Does It Exist Yet? (20)

Introduction to it application
Introduction to it applicationIntroduction to it application
Introduction to it application
 
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...
 
A Posteriori Perusal of Mobile Computing
A Posteriori Perusal of Mobile ComputingA Posteriori Perusal of Mobile Computing
A Posteriori Perusal of Mobile Computing
 
A Posteriori Perusal of Mobile Computing
A Posteriori Perusal of Mobile ComputingA Posteriori Perusal of Mobile Computing
A Posteriori Perusal of Mobile Computing
 
DESIGN AND IMPLEMENTATION OF INTELLIGENT COMMUNITY SYSTEM BASED ON THIN CLIEN...
DESIGN AND IMPLEMENTATION OF INTELLIGENT COMMUNITY SYSTEM BASED ON THIN CLIEN...DESIGN AND IMPLEMENTATION OF INTELLIGENT COMMUNITY SYSTEM BASED ON THIN CLIEN...
DESIGN AND IMPLEMENTATION OF INTELLIGENT COMMUNITY SYSTEM BASED ON THIN CLIEN...
 
DESIGN AND IMPLEMENTATION OF INTELLIGENT COMMUNITY SYSTEM BASED ON THIN CLIEN...
DESIGN AND IMPLEMENTATION OF INTELLIGENT COMMUNITY SYSTEM BASED ON THIN CLIEN...DESIGN AND IMPLEMENTATION OF INTELLIGENT COMMUNITY SYSTEM BASED ON THIN CLIEN...
DESIGN AND IMPLEMENTATION OF INTELLIGENT COMMUNITY SYSTEM BASED ON THIN CLIEN...
 
Design and implementation of intelligent community system based on thin clien...
Design and implementation of intelligent community system based on thin clien...Design and implementation of intelligent community system based on thin clien...
Design and implementation of intelligent community system based on thin clien...
 
Collation of Mobile operatives
Collation of Mobile operativesCollation of Mobile operatives
Collation of Mobile operatives
 
1. What is IT infrastructure and what are its components2.What ar.pdf
1. What is IT infrastructure and what are its components2.What ar.pdf1. What is IT infrastructure and what are its components2.What ar.pdf
1. What is IT infrastructure and what are its components2.What ar.pdf
 
A Study Mobile Computing
A Study   Mobile ComputingA Study   Mobile Computing
A Study Mobile Computing
 
Wearable Computing and Human Computer Interfaces
Wearable Computing and Human Computer InterfacesWearable Computing and Human Computer Interfaces
Wearable Computing and Human Computer Interfaces
 
The Improvement and Performance of Mobile Environment using Both Cloud and Te...
The Improvement and Performance of Mobile Environment using Both Cloud and Te...The Improvement and Performance of Mobile Environment using Both Cloud and Te...
The Improvement and Performance of Mobile Environment using Both Cloud and Te...
 
Mobile Cloud Computing
Mobile Cloud ComputingMobile Cloud Computing
Mobile Cloud Computing
 
Developing For The Pervasive Internet Of Things
Developing For The Pervasive Internet Of ThingsDeveloping For The Pervasive Internet Of Things
Developing For The Pervasive Internet Of Things
 
Mobile Computing by Tapesh Chalisgaonkar
Mobile Computing by Tapesh ChalisgaonkarMobile Computing by Tapesh Chalisgaonkar
Mobile Computing by Tapesh Chalisgaonkar
 
Internet technology and web engineering
Internet technology and web engineeringInternet technology and web engineering
Internet technology and web engineering
 
Technology update
Technology updateTechnology update
Technology update
 
ICT, Importance of programming and programming languages
ICT, Importance of programming and programming languagesICT, Importance of programming and programming languages
ICT, Importance of programming and programming languages
 
IRJET- Voice Controlled Personal Assistant Bot with Smart Storage
IRJET- Voice Controlled Personal Assistant Bot with Smart StorageIRJET- Voice Controlled Personal Assistant Bot with Smart Storage
IRJET- Voice Controlled Personal Assistant Bot with Smart Storage
 
Common protocol to support disparate communication types within industrial Et...
Common protocol to support disparate communication types within industrial Et...Common protocol to support disparate communication types within industrial Et...
Common protocol to support disparate communication types within industrial Et...
 

More from Olivia Moran

Olivia Moran, my linked in recommendations
Olivia Moran, my linked in recommendationsOlivia Moran, my linked in recommendations
Olivia Moran, my linked in recommendationsOlivia Moran
 
Basic Html Tags Tutorial For Kids
Basic Html Tags Tutorial For KidsBasic Html Tags Tutorial For Kids
Basic Html Tags Tutorial For KidsOlivia Moran
 
Top Tips For Creating A Great CV
Top Tips For Creating A Great CVTop Tips For Creating A Great CV
Top Tips For Creating A Great CVOlivia Moran
 
Lesson 3: Linking It All Together
Lesson 3: Linking It All Together Lesson 3: Linking It All Together
Lesson 3: Linking It All Together Olivia Moran
 
Lesson 2: Getting To Know HTML
Lesson 2: Getting To Know HTMLLesson 2: Getting To Know HTML
Lesson 2: Getting To Know HTMLOlivia Moran
 
Lesson 1: Introduction to HTML
Lesson 1: Introduction to HTMLLesson 1: Introduction to HTML
Lesson 1: Introduction to HTMLOlivia Moran
 
Social Media Strategy
Social Media StrategySocial Media Strategy
Social Media StrategyOlivia Moran
 
E-Learning @ The Library
E-Learning @ The LibraryE-Learning @ The Library
E-Learning @ The LibraryOlivia Moran
 
The E-Tutor: A Jack Of All Trades
The E-Tutor: A Jack Of All TradesThe E-Tutor: A Jack Of All Trades
The E-Tutor: A Jack Of All TradesOlivia Moran
 
Biometrics Iris Scanning: A Literature Review
Biometrics Iris Scanning: A Literature ReviewBiometrics Iris Scanning: A Literature Review
Biometrics Iris Scanning: A Literature ReviewOlivia Moran
 
Self Organisation: Inspiring Neural Network & IT Design
Self Organisation: Inspiring Neural Network & IT DesignSelf Organisation: Inspiring Neural Network & IT Design
Self Organisation: Inspiring Neural Network & IT DesignOlivia Moran
 
Project Management: A Critical Examination of the PPARS Project
Project Management: A Critical Examination of the PPARS ProjectProject Management: A Critical Examination of the PPARS Project
Project Management: A Critical Examination of the PPARS ProjectOlivia Moran
 
Knowledge Management: A Literature Review
Knowledge Management: A Literature ReviewKnowledge Management: A Literature Review
Knowledge Management: A Literature ReviewOlivia Moran
 
Brainwave Feature Extraction, Classification & Prediction
Brainwave Feature Extraction, Classification & PredictionBrainwave Feature Extraction, Classification & Prediction
Brainwave Feature Extraction, Classification & PredictionOlivia Moran
 
Complexity Versus Comprehendability: Simplifying Wireless Security
Complexity Versus Comprehendability: Simplifying Wireless SecurityComplexity Versus Comprehendability: Simplifying Wireless Security
Complexity Versus Comprehendability: Simplifying Wireless SecurityOlivia Moran
 
Baseline Brainwave Biometrics
Baseline Brainwave BiometricsBaseline Brainwave Biometrics
Baseline Brainwave BiometricsOlivia Moran
 

More from Olivia Moran (19)

Olivia Moran, my linked in recommendations
Olivia Moran, my linked in recommendationsOlivia Moran, my linked in recommendations
Olivia Moran, my linked in recommendations
 
Basic Html Tags Tutorial For Kids
Basic Html Tags Tutorial For KidsBasic Html Tags Tutorial For Kids
Basic Html Tags Tutorial For Kids
 
Top Tips For Creating A Great CV
Top Tips For Creating A Great CVTop Tips For Creating A Great CV
Top Tips For Creating A Great CV
 
Lesson 3: Linking It All Together
Lesson 3: Linking It All Together Lesson 3: Linking It All Together
Lesson 3: Linking It All Together
 
Lesson 2: Getting To Know HTML
Lesson 2: Getting To Know HTMLLesson 2: Getting To Know HTML
Lesson 2: Getting To Know HTML
 
Lesson 1: Introduction to HTML
Lesson 1: Introduction to HTMLLesson 1: Introduction to HTML
Lesson 1: Introduction to HTML
 
E-College
E-CollegeE-College
E-College
 
Social Media Strategy
Social Media StrategySocial Media Strategy
Social Media Strategy
 
E-Learning @ The Library
E-Learning @ The LibraryE-Learning @ The Library
E-Learning @ The Library
 
Blended Learning
Blended LearningBlended Learning
Blended Learning
 
What is Moodle
What is MoodleWhat is Moodle
What is Moodle
 
The E-Tutor: A Jack Of All Trades
The E-Tutor: A Jack Of All TradesThe E-Tutor: A Jack Of All Trades
The E-Tutor: A Jack Of All Trades
 
Biometrics Iris Scanning: A Literature Review
Biometrics Iris Scanning: A Literature ReviewBiometrics Iris Scanning: A Literature Review
Biometrics Iris Scanning: A Literature Review
 
Self Organisation: Inspiring Neural Network & IT Design
Self Organisation: Inspiring Neural Network & IT DesignSelf Organisation: Inspiring Neural Network & IT Design
Self Organisation: Inspiring Neural Network & IT Design
 
Project Management: A Critical Examination of the PPARS Project
Project Management: A Critical Examination of the PPARS ProjectProject Management: A Critical Examination of the PPARS Project
Project Management: A Critical Examination of the PPARS Project
 
Knowledge Management: A Literature Review
Knowledge Management: A Literature ReviewKnowledge Management: A Literature Review
Knowledge Management: A Literature Review
 
Brainwave Feature Extraction, Classification & Prediction
Brainwave Feature Extraction, Classification & PredictionBrainwave Feature Extraction, Classification & Prediction
Brainwave Feature Extraction, Classification & Prediction
 
Complexity Versus Comprehendability: Simplifying Wireless Security
Complexity Versus Comprehendability: Simplifying Wireless SecurityComplexity Versus Comprehendability: Simplifying Wireless Security
Complexity Versus Comprehendability: Simplifying Wireless Security
 
Baseline Brainwave Biometrics
Baseline Brainwave BiometricsBaseline Brainwave Biometrics
Baseline Brainwave Biometrics
 

Recently uploaded

ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxVanesaIglesias10
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptxmary850239
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxlancelewisportillo
 
Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)cama23
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfVanessa Camilleri
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxCarlos105
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management systemChristalin Nelson
 
Food processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture honsFood processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture honsManeerUddin
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4JOYLYNSAMANIEGO
 

Recently uploaded (20)

ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptx
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
 
Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdf
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management system
 
Food processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture honsFood processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture hons
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4
 

Technology Infrastructure For The Pervasive Vision, Does It Exist Yet?

  • 1. Technology Infrastructure For The Pervasive Vision ‘Does The Technology Infrastructure Needed To Implement The Pervasive Vision Really Exist Yet?’ By Olivia Moran [www.oliviamoran.me]
  • 2. About The Author Olivia Moran is a leading training specialist who specialises in E-Learning instructional design and is a certified Moodle expert. She has been working as a trainer and course developer for 3 years developing and delivery training courses for traditional classroom, blended learning and E-learning. Courses Olivia Moran Has Delivered: ● MOS ● ECDL ● Internet Marketing ● Social Media ● Google [Getting Irish Businesses Online] ● Web Design [FETAC Level 5] ● Adobe Dreamweaver ● Adobe Flash ● Moodle Specialties: ★Moodle [MCCC Moodle Certified Expert] ★ E Learning Tools/ Technologies [Commercial & Open Source] ★ Microsoft Office Specialist ★ Web Design & Online Content Writer ★ Adobe Dreamweaver, Flash & Photoshop Page: 3 Technology Infrastructure For The Pervasive Vision: Does It Exist Yet? © Olivia Moran [www.oliviamoran.me]
  • 3. 1. ABSTRACT This document will explore the technologies used for pervasiveness in an attempt to determine whether or not the technology infrastructure needed to implement the pervasive vision is really there yet. The different hardware and software used by professionals to create pervasive solutions will be examined. It will focus on the limitations of mobile devices, the operating systems they will use, Wireless Application Protocol (W.A.P.), Transmission Control Protocol and the Internet Protocol (TCP/IP). Also examined is the over use of ad hoc solutions. Wireless networks and protocols as well as the software used for pervasive application development will be examined. It will illustrate how seamless communication occurs and the role that network operators and the handover process play in the achievement of this goal. It will consider how a lack of standards is impacting on the success and growth of the pervasive industry as well as the issue of user acceptance. 2. INTRODUCTION According to Kohler and Erdmann (2004), Pervasive Computing is “A vision of future applications of Information and Communication Technologies (I.C.T) in which highly miniaturized, embedded, networked microprocessors equipped with sensors will pervade our daily lives”. The word pervasive means to spread throughout, to permeate or pervade, hence the term pervasive is used to describe the spreading of computers and other communication devices throughout our everyday lives. “The vision of Pervasive Computing is built on the assumption that computers will become part of everyday objects, augmenting them with information services and enhanced functionality” Hilty et al (2004). Pervasive computing is becoming a major area of interest. There are now countless numbers of pervasive devices available, varying in shape, size, functionality and cost. The reduced cost and size of memory and pervasive devices as well as more powerful and faster processors have made the growth and acceleration of pervasive computing possible. Pervasive computing has in affect led to the creation of an entirely new business market and has the potential to alter significantly the way in which people communicate. The vision of pervasive computing envisages obtaining your information where you stand, when you need it and in the format you need it. Reaching such a stage would according to Burkhardt et al (2002) “Give users the freedom not only to communicate efficiently at any place in the world but also to access local information as well as information residing on the internet at any place and at any time” Realising this pervasive vision is a long way off. Hansmann et al (2003) highlights that “Pervasive applications need to take care of various hardware and software platforms, as well as very different form factors and user interfaces. This obstacle strongly impacts portability”. This paper aims to highlight the extent to which technologies are able to support the pervasive vision and whether or not the infrastructure that currently exists is sufficient for implementing this vision. The most commonly used hardware and software available at present for the creation of pervasive solutions are examined at length. This document is concerned with the limitations of mobile devices, the operating systems they use, W.A.P. and TCP/IP Protocol. Page: 4 Technology Infrastructure For The Pervasive Vision: Does It Exist Yet? © Olivia Moran [www.oliviamoran.me]
  • 4. Also examined is the over use of ad hoc solutions. Wireless networks and protocols as well as the software used for pervasive application development will be explored. Network operators and the role they play in the handover process are also considered and how this process is vital to seamless communications over different geographical locations. In this paper the different problems that arise from the lack of standards in the pervasive industry are presented. Lastly, the issue of user acceptance is considered and how this matter impacts on the development of some technologies. 3. HARDWARE & SOFTWARE TECHNOLOGIES “Today’s emerging pervasive computing technology faces serious technical issues: most devices have strong limitations on memory usage and processor performance as well as tight constraints on power consumptions” Hansmann et al (2003). There are hundreds of different models of mobile phones as well as Personal Digital Assistants (P.D.A’s) and numerous platforms that must be taken into account by the developer when building a suitable user interface. These devices vary in size, shape and functionality. Each mobile phone requires a different interface that allows the user to communicate with the computer. Some mobile devices are multimodal, where input and output is given using more than one modality i.e. pen, voice, touch screen etc. The lack of standards causes a real problem for developers. There is no one agreed upon standard that all developers can follow. 3.1 Limitations of Pervasive Devices Pervasive devices face many limitations that their desktop counterparts do not. Such limitations relate mainly to reliable power supplies, display sizes and interfaces for input and output, memory capacity as well as processor power. Portable batteries are used to power pervasive devices. The life of these batteries once charged will differ depending on the type of battery that it is. Some of the more desirable batteries include Nickel-Cadmium (NIMH), Lithium Polymer or the most commonly used Lithium Ion (Li ion). Such batteries are much lighter in weight, smaller in size and more environmentally friendly than previously used batteries however, they are not capable of supporting long-term use without needing to recharge. Pervasive devices usually have a relatively small display and this can cause some major problems for designers. Forms need to be able to adapt to the specifications of the phone or else they will display incorrectly. It is very important to consider colour, scale and spacing, as failing to take these into account will result in a task taking longer to complete. “The screen layout should be self-explaining and reduced to the absolutely necessary elements” Hansmann et al (2003). The different input and output i.e. pen based, touch screen, voice etc. modalities of each device must also be considered in light of the application being developed. Memory has recently become much more affordable, most likely due to increased demand for portable devices. Pervasive devices such as camera phones and P.D.A.’s can store a substantial amount of data with many of these allowing for the attachment of Microdrives like those developed by IBM. Processing power is another issue that mobile devices must contend with. The pervasive devices that are in operation today such as a typical smart phone have more processing capabilities and a higher clock rate than the best computers available two decades ago. With this said they are still incapable of dealing with huge amounts of data and therefore what needs to be processed should be kept to a minimum. Page: 5 Technology Infrastructure For The Pervasive Vision: Does It Exist Yet? © Olivia Moran [www.oliviamoran.me]
  • 5. 3.2 Operating Systems (O.S.) The only thing a user is usually concerned about when using a pervasive device is the speed and length of time that it takes to do a task. They do not wish nor need to know what is going on in the background. Consequently, “The footprints of Operating Systems and software need to be reduced as much as possible. Mobile devices must handle power shortages and their applications must be able to resume again after shutdown” Hansmann et al (2003). Burkhardt (2002) points out “The core functionality of every pervasive computing device is determined by its operating system”. This can range from basic functionality like that provided by the Palm O.S. or those with a lot of complexity such as Windows CE, a powerful O.S. The O.S. is responsible for tasks such as user, task, power and memory management. It is highly important that the O.S. chosen for each device is appropriate given its features, capabilities and the tasks that it must perform. 3.3 Wireless Application Protocol (W.A.P.) W.A.P. is an Internet protocol that defines “An optimised protocol stack for communication over wireless lines, an application environment for mobile phone applications, a content description language, and a miniature browser interface” Burkhardt et al (2002). Contributing to its success is that “W.A.P. offers a broad market for developers. One worldwide standard that is device- independent and bearer-independent assures developers of a broad, ever-expanding market for content and applications” Steenderen (2002). W.A.P. does have some limitations. It does not deal well with limited bandwidth and the requirements of smaller user interfaces. However, with the increased availability and more affordable costs of broadband this limitation will be overcome. 3.4 Transmission Control Protocol and Internet Protocol (TCP/IP) TCP/IP protocols were designed for wired networks and do not adapt particularly well to wireless networks. According to Alanko et al (1999) “Differences between wired and wireless links cause complications. The common data communication protocols, like the TCP/IP Internet protocols, do not expect problems like those occurring in a cellular telephone network”. TCP connections often have poor performance as they can misinterpret lost packets as “Network congestion and slows down the rate of transmission” Alanko et al (1999). Such a belief results in the TCP layer stopping what it is doing so that it can listen and wait for the congestion to disappear. This is problematic, as no congestion actually exists and it stops sending the data packets. The ideal situation would be that it increases packet transmission frequency and speed as the loss of packets is most likely due to transmission errors caused by changes in the networks physical layer. Alanko et al (1999) also notes “Multiple TCP connections over a low-bandwidth link can interfere with each other … Parallel TCP connections competing for the same constrained link interfere with each other in a way that causes additional retransmissions”. 3.5 Ad Hoc Solutions Companies are extremely innovative and constantly come up with new ways to use existing technologies. However “It is now widely acknowledged that the success of pervasive computing technologies will require a radical design shift, and that it is not sufficient to simply extrapolate from existing desktop computing technologies” Henricksen et al (2002). While this may be beneficial in the short term it is creating a wide range of problems in the pervasive computing industry and has lead to the very messy Internet that we use today. Page: 6 Technology Infrastructure For The Pervasive Vision: Does It Exist Yet? © Olivia Moran [www.oliviamoran.me]
  • 6. Most pervasive devices work on an infrastructure, which at the time of its inception, developers built without considering modifications and developments that may have been needed in the future. The construction of the infrastructure in this ad hoc manner creates many problems and results in changes being expensive and hard to carry out. 3.6 Wireless Networks & Protocols The position that the pervasive industry finds itself in today is somewhat thanks to the various technologies most notably IEEE 802.11 upon which WIFI and Bluetooth is based. These are both protocols that allow connections to be established without any cables. IEEE 802.11 is a standard used which allows mobile devices or networks to communicate using radio frequencies. While Wireless Local Area Network (W.L.A.N.) capabilities based on this standard are within the capabilities of some smart phones it is generally reserved for devices of the gaming industry like that of the Play Station Portable (PSP). These IEEE 802.11 set of standards are being expanded and “Perhaps the most important development from a mobile device perspective is the enhancement of voice handling in 802.11e. It extends the protocol with voice handling capabilities” Andersson (2006). Bluetooth as described by Hansmann (2003) is “A standard for a short-range radio frequency network between devices”. Bluetooth while relatively slow in being adapted, has its success in the fact that “Bluetooth chipsets are cheap and that they have a protocol stack that makes information exchange easy” Andersson (2006). It does however have some limitations in that “It has had difficulties in obtaining user adoption beyond headsets, even tough it made it under the hood of the mobile device – people find it easier to plug in a USB cable than activate Bluetooth and connect to another device” Andersson (2006). Companies such as Nokia are trying to create a demand for Bluetooth devices other than headsets with the creation of devices like their ‘Nokia Sensor’ a software application for phones that “Offers a new way for people to create information and share it with other phone users nearby” Andersson (2006). Rodriguez et al (1999) puts forward the argument that WLAN’s provide “An awesome opportunity for unprecedented access to information and applications by mobile workers and professionals”. On the other hand one must also consider the fact that “Limited bandwidth, high latency, high cost, poor reliability and security risks of wireless networks greatly inhibit supporting today’s applications over wireless networks”. Privacy remains a major issue for wireless networks. Signals moving through the air can be easily intercepted and deciphered. However, users may be willing to surrender some of their privacy if they believe that the benefits will outweigh this disadvantage. 3.7 Pervasive Application Development Software Java to micro edition (J2ME) and Microsoft Visual Studio 2005 are technologies that are widely used to develop pervasive applications for use on mobile devices. The original Java language was created out of a desire to come up with a language that could be used for the development of software that would run on any type of hardware. Its basically ‘write once, run anywhere’. It essentially ensures a greater level of platform independence. A version of java that could be used on small devices such as smart phones and PDA’s was developed. This language became known as J2ME. By 2001, a vast amount of mobile phones supported the use of J2ME and today has evolved into one of the most supported platforms on small devices. J2ME does however have some limitations. It takes quite a long time to become proficient with its use, to build applications and these often have slower performance than those created by other similar technologies. Page: 7 Technology Infrastructure For The Pervasive Vision: Does It Exist Yet? © Olivia Moran [www.oliviamoran.me]
  • 7. Microsoft Visual Studio 2005 is another development environment. It is based on a .Net framework and like J2ME it has a steep learning curve. On the other hand it allows for the development of applications in Visual Basic, C++, C# and Visual J# programming languages. 4. NETWORK OPERATORS & HANDOVERS A major obstacle for the pervasive industry is the achievement of a seamless exchange of users from one network operator to another. This process needs to result in an “Efficient and cost effective interworking between overlay networks for the seamless provisioning of current and future applications and services” Doufexi et al (2004). The device must constantly listen for changes in network conditions and determine the optimum time for the hand over. If this procedure is not carried out correctly crucial data packets may be lost. Different handover models exist to manage this event; the ‘Vertical Handover’ is one such method. Such a model enables “Users to roam freely between heterogeneous networks while maintaining the continuity of their applications” Balasubramaniam & Indulska (2003). It is concerned with context awareness and issues such as “Network disconnections and changes in network Quality of Service” Balasubramaniam & Indulska (2003). 5. LACK OF STANDARDS The pervasive industry is currently haunted by lack of standards with interoperability and standardisation being highly important to its future. Many fail to recognise the significance of these issues and are unwilling to take the time necessary for the development of standards. Many developers feel that they cant take the risk of waiting to deploy their product and service. Those that are first to the market are those who usually gain an early competitive advantage. Andersson et al (2006) share a similar view arguing that while “Proprietary solutions are always the fastest way of getting a new technology to market, the result has been fragmentation of formats” Organisations such as the World Wide Web Consortium (W3C), Open Mobile Alliance (OMA) and the Java Community Process (JCP), lay standards down for the pervasive computing industry. These bodies constantly govern the industry and its growth as well as development. The utilisation of standards ensures that the various pervasive hardware devices and software produced are implemented in a satisfactory way. As noted by McGovern & Norton (2002) “A common standard empowers rather than restricts”. These standards can change from time to time as pervasive computing is still in its infancy and thus is continually developing and evolving. 6. THE CUSTOMER & USER ACCEPTANCE Further development of some promising technologies has been halted by high development costs. While an organisation may be able to produce a pervasive product to satisfy consumer needs, they often fail to do so in an economic way. Schmidt et al (2006) highlights that “Price still seems to be the main obstacle for introducing the technologies”. It impacts greatly on gaining user acceptance. Page: 8 Technology Infrastructure For The Pervasive Vision: Does It Exist Yet? © Olivia Moran [www.oliviamoran.me]
  • 8. For a user to accept the product that is being offered it must be capable of performing its activities at least the same or better than the desktop does. As Andersson et al (2006) points out “Customers expect to access the same (or similar) information and applications when on the move as from their desktops … Ease of use and reliability have always been trademarks and customers have very little tolerance of a hand-held device that has to be restarted every once in a while”. Take for example phones with W.A.P. capabilities, these did not take off as expected due to low user acceptance. This example aims to highlight that even where the technology may exist to support pervasiveness it may simple not be used. Drawing on the previous example, users viewed the W.A.P. enabled phone as offering the same service as their desktops but one which was less reliable, slower and much more expensive. It is clear to see that other factors such as user acceptance have a huge impact on the future development and growth of technologies that could be used to support the pervasive vision. 7. CONCLUSION This document examined the different hardware and software technologies used by professionals in the development of pervasive applications and devices in an attempt to determine the extent to which the pervasive infrastructure is ready to support the true pervasive vision. It focused on key areas pertaining to the limitations of mobile devices, the operating systems they will use, W.A.P., TCP/IP Protocol, the over use of ad hoc solutions, wireless networks and protocols as well as the software used for pervasive application development. It also looked at the role of network operators and the handover process necessary for seamless communication. It briefly considered the various problems that developers encounter due to lack of standards. Lastly, the issue of user acceptance was considered and how this matter can impact on the development of different technologies. One of the major problems that the pervasive industry faces at the moment is that instead of creating new technologies specifically aimed at supporting mobile computing, developers are instead too focused on modifying existing solutions that were built for wired networks and desktops. This course of action is extremely time consuming, costly and not always the best way to approach a particular problem. Grimm et al (2000) argues, “Existing operating system abstractions and services are neither sufficient nor necessarily appropriate for a pervasive computing infrastructure”. Developers need to begin thinking outside of the box. Lack of standards is also contributing somewhat to the problem. From carrying out extensive research into this area it seems as though the technologies needed to support the ultimate pervasive vision are not available yet. However, the author does not wish to underestimate the innovative spirit of those working in the industry and shares the view of Andersson et al (2006) that “Perhaps advances in the area of pervasive computing will not be made possible only through the development of new technologies or applications but also through the re-examination and reengineering of current offerings. People are resourceful and innovative and have the ability to make the best of what they have”. The author is confident that the coming years will bring significance advances towards the realisation of the pervasive vision. Page: 9 Technology Infrastructure For The Pervasive Vision: Does It Exist Yet? © Olivia Moran [www.oliviamoran.me]