SlideShare ist ein Scribd-Unternehmen logo
1 von 13
PERVASIVE COMPUTING
By,
R.Preethi,
M.Sc.,CS
Department of IT
VHNSN College
Virudhunagar
WHAT IS PERVASIVE COMPUTING?
 Pervasive means “EXISTING EVERYWHERE”
 Pervasive computing embodies the future of network computing
enabling wireless communication between individuals and computing
devices and between devices itself.
 Pervasive Computing devices are tiny, invisible microprocessors
embedded in any type of objects like clothes,home,cars,watches etc.,
 Also known as Ubiquitous Computing.
PERVASIVE NETWORKING
 Pervasive networking is the ability for devices to
autonomously arrange themselves into local networks and
exchange information through these networks.
 Components of Pervasive networking:
Pervasive Network Layer
Pervasive Access Layer
Pervasive Device Layer
Pervasive Human Machine Interaction Layer
Pervasive Human Core Layer
LAYERS OF PERVASIVE NETWORKING
 Pervasive Network Layer
This layer includes all networks and the networks
are connected directly or indirectly to the internet. Server
and Gateways are the important parts in this layer.
 Pervasive Access Layer
This layer deals with pervasive network connection
issues. Issues considered in this layer are Service
Discovery and Management, network access protocols.
LAYERS OF PERVASIVE NETWORKING
 Pervasive Device Layer
This layer includes all user interactive devices
whether they are interacted directly or indirectly. Issues
considered in this layer are Sensors and Smart Devices.
 Pervasive HMI Layer
This layer deals Human interaction with all network
accessed devices.
LAYERS OF PERVASIVE NETWORKING
 Pervasive Human Core Layer
This layer is the inner layer of the Pervasive
networking. Issues in this layer are based on the various
applications. Applications considered for human core
layer are such as Health care, smart home, business
application etc.,
TELE-HOME HEALTHCARE SYSTEM
It monitors the health states of people in Health care
System. The monitoring information should be reported
to the Hospital Service center. If there is an emergent
incident it should detected and reported to relatives,
Emergency Health care System.
 If the home cared Family member has any Emergency
Health Problems, the HMI & Service Management will
inform the Hospital Service center, Community
emergency center and relatives by SMS at the same
time.
ADVANTAGES OF PERVASIVE COMPUTING
 Manage information quickly, efficiently and effortlessly.
 Smart Environments will be embedded with computing
technologies that will be mostly out-of-sight
 Removes complexity of new technologies.
 Convenient access to relevant information stored on
networks, allowing them to easily take action anywhere,
anytime.
 Environment will be supplemented with interconnected
digital technologies. Interconnectivity will eliminate
mundane tasks.
DISADVANTAGES OF PERVASIVE
COMPUTING
 Pervasive Computing is not entirely secure.
 Frequent line connections that are broken.
 Slow Connections.
 Very expensive operating costs.
CONCLUSION
 Removal of wires in the network computing available to
everyone everywhere.
 Information can be accessed when and where it is
needed
 But still Privacy and Security major drawbacks of the
Pervasive Computing.
Pervasive Computing Explained
Pervasive Computing Explained

Weitere ähnliche Inhalte

Was ist angesagt?

Was ist angesagt? (20)

Seminar on pervasive computing
Seminar  on pervasive computingSeminar  on pervasive computing
Seminar on pervasive computing
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 
Edge Computing.pptx
Edge Computing.pptxEdge Computing.pptx
Edge Computing.pptx
 
M2M - Machine to Machine Technology
M2M - Machine to Machine TechnologyM2M - Machine to Machine Technology
M2M - Machine to Machine Technology
 
THE INTERNET OF THINGS
THE INTERNET OF THINGSTHE INTERNET OF THINGS
THE INTERNET OF THINGS
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 
Pervasive Computing
Pervasive ComputingPervasive Computing
Pervasive Computing
 
FOG COMPUTING- Presentation
FOG COMPUTING- Presentation FOG COMPUTING- Presentation
FOG COMPUTING- Presentation
 
IOT ppt
IOT pptIOT ppt
IOT ppt
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
Mobile Computing | Computer Science
Mobile Computing | Computer ScienceMobile Computing | Computer Science
Mobile Computing | Computer Science
 
Fog Computing
Fog ComputingFog Computing
Fog Computing
 
Mobile Computing
Mobile ComputingMobile Computing
Mobile Computing
 
VANET in Mobile Computing
VANET in Mobile ComputingVANET in Mobile Computing
VANET in Mobile Computing
 
Introduction to Ubiquitous Computing
Introduction to Ubiquitous ComputingIntroduction to Ubiquitous Computing
Introduction to Ubiquitous Computing
 
Domain specific IoT
Domain specific IoTDomain specific IoT
Domain specific IoT
 
Mobile computing -- Introduction
Mobile computing -- IntroductionMobile computing -- Introduction
Mobile computing -- Introduction
 
FOG COMPUTING
FOG COMPUTINGFOG COMPUTING
FOG COMPUTING
 
Cloud computing vs edge computing
Cloud computing vs edge computingCloud computing vs edge computing
Cloud computing vs edge computing
 
Edge computing
Edge computingEdge computing
Edge computing
 

Ähnlich wie Pervasive Computing Explained

Pervasivecomputing 140422034057-phpapp02
Pervasivecomputing 140422034057-phpapp02Pervasivecomputing 140422034057-phpapp02
Pervasivecomputing 140422034057-phpapp02Pravallika Reddy
 
Ubiquitous networking
Ubiquitous networkingUbiquitous networking
Ubiquitous networkingAashish Jain
 
Chap1 introduction to Pervasive Computing
Chap1 introduction to Pervasive ComputingChap1 introduction to Pervasive Computing
Chap1 introduction to Pervasive ComputingANUSUYA T K
 
Applications of Computer Networking | Computer Science
Applications of Computer Networking | Computer ScienceApplications of Computer Networking | Computer Science
Applications of Computer Networking | Computer ScienceTransweb Global Inc
 
Security Attacks And Solutions On Ubiquitous Computing Networks
Security Attacks And Solutions On Ubiquitous Computing NetworksSecurity Attacks And Solutions On Ubiquitous Computing Networks
Security Attacks And Solutions On Ubiquitous Computing NetworksAhmad Sharifi
 
Quality Metrics In Ubiquitous Computing
Quality Metrics In Ubiquitous ComputingQuality Metrics In Ubiquitous Computing
Quality Metrics In Ubiquitous ComputingRutvik Pensionwar
 
Unit_1_IOT_INTRO.pptx
Unit_1_IOT_INTRO.pptxUnit_1_IOT_INTRO.pptx
Unit_1_IOT_INTRO.pptxBharat Tank
 
Fuzzy Control Based Mobility Framework for Evaluating Mobility Models in MANE...
Fuzzy Control Based Mobility Framework for Evaluating Mobility Models in MANE...Fuzzy Control Based Mobility Framework for Evaluating Mobility Models in MANE...
Fuzzy Control Based Mobility Framework for Evaluating Mobility Models in MANE...AlAtfat
 
Pervasive computing
Pervasive computingPervasive computing
Pervasive computingPallav Kumar
 
Ece abstract
Ece abstractEce abstract
Ece abstractpriyaNIIT
 
Mobile computing
Mobile computingMobile computing
Mobile computingSaranyaK68
 
Wireless Gateway: Connecting the Unconnected
Wireless Gateway: Connecting the UnconnectedWireless Gateway: Connecting the Unconnected
Wireless Gateway: Connecting the UnconnectedInfyiot Solutions
 
Presentation1.pptx
Presentation1.pptxPresentation1.pptx
Presentation1.pptxShailiPal1
 
Presentation1.pptx
Presentation1.pptxPresentation1.pptx
Presentation1.pptxShailiPal1
 
Overview of mobile computing
Overview of mobile computingOverview of mobile computing
Overview of mobile computingVENNILAV6
 

Ähnlich wie Pervasive Computing Explained (20)

Pervasivecomputing 140422034057-phpapp02
Pervasivecomputing 140422034057-phpapp02Pervasivecomputing 140422034057-phpapp02
Pervasivecomputing 140422034057-phpapp02
 
Ubiquitous networking
Ubiquitous networkingUbiquitous networking
Ubiquitous networking
 
Chap1 introduction to Pervasive Computing
Chap1 introduction to Pervasive ComputingChap1 introduction to Pervasive Computing
Chap1 introduction to Pervasive Computing
 
Applications of Computer Networking | Computer Science
Applications of Computer Networking | Computer ScienceApplications of Computer Networking | Computer Science
Applications of Computer Networking | Computer Science
 
PERVASIVE COMPUTING
PERVASIVE COMPUTINGPERVASIVE COMPUTING
PERVASIVE COMPUTING
 
Security Attacks And Solutions On Ubiquitous Computing Networks
Security Attacks And Solutions On Ubiquitous Computing NetworksSecurity Attacks And Solutions On Ubiquitous Computing Networks
Security Attacks And Solutions On Ubiquitous Computing Networks
 
module -1 fuill notes.pdf
module -1 fuill notes.pdfmodule -1 fuill notes.pdf
module -1 fuill notes.pdf
 
Quality Metrics In Ubiquitous Computing
Quality Metrics In Ubiquitous ComputingQuality Metrics In Ubiquitous Computing
Quality Metrics In Ubiquitous Computing
 
module-1 part a.pptx
module-1 part a.pptxmodule-1 part a.pptx
module-1 part a.pptx
 
Unit_1_IOT_INTRO.pptx
Unit_1_IOT_INTRO.pptxUnit_1_IOT_INTRO.pptx
Unit_1_IOT_INTRO.pptx
 
Fuzzy Control Based Mobility Framework for Evaluating Mobility Models in MANE...
Fuzzy Control Based Mobility Framework for Evaluating Mobility Models in MANE...Fuzzy Control Based Mobility Framework for Evaluating Mobility Models in MANE...
Fuzzy Control Based Mobility Framework for Evaluating Mobility Models in MANE...
 
Pervasive computing
Pervasive computingPervasive computing
Pervasive computing
 
Smart Elevator
Smart ElevatorSmart Elevator
Smart Elevator
 
Ece abstract
Ece abstractEce abstract
Ece abstract
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 
Wireless Gateway: Connecting the Unconnected
Wireless Gateway: Connecting the UnconnectedWireless Gateway: Connecting the Unconnected
Wireless Gateway: Connecting the Unconnected
 
Presentation1.pptx
Presentation1.pptxPresentation1.pptx
Presentation1.pptx
 
Presentation1.pptx
Presentation1.pptxPresentation1.pptx
Presentation1.pptx
 
K011117277
K011117277K011117277
K011117277
 
Overview of mobile computing
Overview of mobile computingOverview of mobile computing
Overview of mobile computing
 

Kürzlich hochgeladen

Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 

Kürzlich hochgeladen (20)

Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 

Pervasive Computing Explained

  • 2. WHAT IS PERVASIVE COMPUTING?  Pervasive means “EXISTING EVERYWHERE”  Pervasive computing embodies the future of network computing enabling wireless communication between individuals and computing devices and between devices itself.  Pervasive Computing devices are tiny, invisible microprocessors embedded in any type of objects like clothes,home,cars,watches etc.,  Also known as Ubiquitous Computing.
  • 3. PERVASIVE NETWORKING  Pervasive networking is the ability for devices to autonomously arrange themselves into local networks and exchange information through these networks.  Components of Pervasive networking: Pervasive Network Layer Pervasive Access Layer Pervasive Device Layer Pervasive Human Machine Interaction Layer Pervasive Human Core Layer
  • 4. LAYERS OF PERVASIVE NETWORKING  Pervasive Network Layer This layer includes all networks and the networks are connected directly or indirectly to the internet. Server and Gateways are the important parts in this layer.  Pervasive Access Layer This layer deals with pervasive network connection issues. Issues considered in this layer are Service Discovery and Management, network access protocols.
  • 5. LAYERS OF PERVASIVE NETWORKING  Pervasive Device Layer This layer includes all user interactive devices whether they are interacted directly or indirectly. Issues considered in this layer are Sensors and Smart Devices.  Pervasive HMI Layer This layer deals Human interaction with all network accessed devices.
  • 6. LAYERS OF PERVASIVE NETWORKING  Pervasive Human Core Layer This layer is the inner layer of the Pervasive networking. Issues in this layer are based on the various applications. Applications considered for human core layer are such as Health care, smart home, business application etc.,
  • 7. TELE-HOME HEALTHCARE SYSTEM It monitors the health states of people in Health care System. The monitoring information should be reported to the Hospital Service center. If there is an emergent incident it should detected and reported to relatives, Emergency Health care System.
  • 8.  If the home cared Family member has any Emergency Health Problems, the HMI & Service Management will inform the Hospital Service center, Community emergency center and relatives by SMS at the same time.
  • 9. ADVANTAGES OF PERVASIVE COMPUTING  Manage information quickly, efficiently and effortlessly.  Smart Environments will be embedded with computing technologies that will be mostly out-of-sight  Removes complexity of new technologies.  Convenient access to relevant information stored on networks, allowing them to easily take action anywhere, anytime.  Environment will be supplemented with interconnected digital technologies. Interconnectivity will eliminate mundane tasks.
  • 10. DISADVANTAGES OF PERVASIVE COMPUTING  Pervasive Computing is not entirely secure.  Frequent line connections that are broken.  Slow Connections.  Very expensive operating costs.
  • 11. CONCLUSION  Removal of wires in the network computing available to everyone everywhere.  Information can be accessed when and where it is needed  But still Privacy and Security major drawbacks of the Pervasive Computing.