Professional Documents
Culture Documents
The number of machines connected to the Internet has confidential information, and demand the highest security
been increasing at an exponential rate and will continue for all these transactions and require complete access to
to grow at this rate as the existing networks of embedded time-sensitive data, regardless of physical location. We
computers, including those that already exist within our expect devices -- personal digital assistants, mobile
automobiles, are connected to the larger, global network, phones, office PCs and home entertainment systems -- to
and as new networks of embedded devices are constructed access that information and work together in one
in our homes and offices. The kinds of devices that will be seamless, integrated system. Pervasive computing gives us
used to access the Internet are no longer confined to the tools to manage information quickly, efficiently, and
desktops and servers, but include small devices with effortlessly.
limited user interface facilities (such as cell phones and
PDAs); wireless devices with limited bandwidth, It aims to enable people to accomplish an increasing
computing power, and electrical power; and embedded number of personal and professional transactions using a
processors with severe limitations on the amount of new class of intelligent and portable appliances or "smart
memory and computing power available to them. Many of devices" embedded with microprocessors that allow users
these devices are mobile, changing not only geographic to plug into intelligent networks and gain direct, simple,
position, but also their place in the topology of the and secure access to both relevant information and
network. services. It gives people convenient access to relevant
information stored on powerful networks, allowing them
Unlike traditional Desktop Computers and existing to easily take action anywhere, anytime.
networks, the new devices will have the following
characteristics: Pervasive computing simplifies life by combining open
standards-based applications with everyday activities. It
• Many will have small, inexpensive removes the complexity of new technologies, enables us to
processors with limited memory and be more efficient in our work and leaves us more leisure
little or no persistent storage. time and thus pervasive computing is fast becoming a part
of everyday life.
• They will connect to other computing
elements without the direct intervention 3. Ongoing Research
of users.
A number of leading technological organizations are
• Often, they will be connected by exploring pervasive computing. Xerox's Palo Alto
wireless networks. Research Center (PARC), for example, has been working
on pervasive computing applications since the 1980s.
• They will change rapidly, sometimes by Although new technologies are emerging, the most
being mobile, sometimes by going on crucial objective is not, necessarily, to develop new
and offline at widely varying rates. Over technologies. IBM's project Planet Blue, for example, is
time, they will be replaced (or fail) far largely focused on finding ways to integrate existing
more rapidly than is now common. technologies with a wireless infrastructure. Carnegie
Mellon University's Human Computer Interaction
• They will be used as a source of Institute (HCII) is working on similar research in their
information, often sending that Project Aura, whose stated goal is "to provide each user
information into the center of the with an invisible halo of computing and information
network to which they are attached. services that persists regardless of location." The
Massachusetts Institute of Technology (MIT) has a project
called Oxygen. MIT named their project after that
substance because they envision a future of ubiquitous
computing devices as freely available and easily accessible
2.1 The advantages of Pervasive Computing as oxygen is today.
We increasingly rely on the electronic creation, storage, 3.1 What is this next generation going to look like?
and transmittal of personal, financial, and other
International Journal of Computer Science and Network (IJCSN)
Volume 1, Issue 3, June 2012 www.ijcsn.org ISSN 2277-5420
Today the uses of Internet are limited as its users look for makes the best use of the available
read-mostly information. As we move to a world where ingredients, and then guide us through
the Internet is used as an infrastructure for embedded preparation of the recipe with the aid of
computing, all this will change. We can hypothesize that a network-connected food processor and
the individual utility of mobile communication, wireless blender. Or they will communicate to
appliances and the respective mobile services - pervasive optimize the energy usage in our
technologies in general - will be exploited through a households.
digital environment that is –
• Cars will use the Internet to find an
open parking space or the nearest
vegetarian restaurant for their owners or
• aware of their presence to allow the manufacturer to diagnose
problems before they happen, and either
• sensitive, adaptive and responsive to inform the owner of the needed service
their needs, habits and emotions or automatically install the necessary
(software) repair.
• and ubiquitously accessible via natural
interaction .increasingly, many of the • Wrist watches will monitor our sugar.
chips around us will sense their
environment in rudimentary but effective
ways. For Example -
Transactions on Computer Systems 10(1), [30] Satyanarayanan, M.A Survey of Distributed File
February, 1992. Systems. In Traub, J.F., Grosz, B., Lampson, B.,
[18] Lebeck, A.R., Fan, X., Zheng, H., Ellis, C.S. Nilsson, N.J. (editors), Annual Review of
Power Aware Page Allocation. In Proceedings of Computer Science. Annual Reviews, Inc, 1989.
the Ninth International Conference on [31] Satyanarayanan, M.Fundamental Challenges in
Architectural Support for Programming Mobile Computing. In Proceedings of the
Languages and Operating Systems. November, Fifteenth ACM Symposium on Principles of
2000. Distributed Computing. Philadelphia, PA, May,
[19] Lynch, N.A. Distributed Algorithm. Morgan 1996.
Kaufmann, 1993 [32] Schilit, B., Adams, N., Want, R. Context-Aware
[20] Mullender, S.J. (editor).Distributed Computing Applications. In Proceedings of the
Systems.Addison-Wesley, 1993. Workshop on Mobile Computing Systems and
[21] Mummert, L.B., Ebling, M.R., Satyanarayanan, Applications. Santa Cruz, CA, December,1994.
M.Exploiting Weak Connectivity for Mobile File [33] Schmidt, B.K., Lam, M.S., Northcutt, J.D.The
Access. In Proceedings of the 15th ACM Interactive Performance of SLIM: a Stateless,
Symposium on Operating Systems Principles. Thin-Client Architecture. In Proceedings of the
Copper Mountain Resort, CO, December, 1995. 17th ACM Symposium on Operating Systems and
[22] Nahrsted, K., Chu, H., Narayan, S. QoS-aware Principles. Kiawah Island, SC, December, 1999.
Resource Management for Distributed [34] Smailagic, A., Siewiorek, D.P.Modalities of
Multimedia Applications. Journal on High- Interaction with CMU Wearable
Speed Networking 7(3/4), 1998. Computers.IEEE Personal Communications 3(1),
[23] Needham, R.M and Schroeder, M.D. Using February, 1996.
Encryption for Authentication in Large Networks [35] Spreitzer, M., Theimer, M.Providing Location
of Computers. Communications of the ACM Information in a Ubiquitous Computing
21(12), December, 1978. Environment. In Proceedings of the 14th ACM
[24] Noble, B.D., Satyanarayanan, M., Narayanan, Symposium on Operating System Principles.
D., Tilton, J.E.,Flinn, J., Walker, K.R.Agile December, 1993.
Application-Aware Adaptation for Mobility. In [36] Steiner, J.G., Neuman, G., Schiller, J.I.Kerberos:
Proceedings of the 16th ACM Symposium on An Authentication Service for Open Network
Operating Systems Principles. Saint-Malo, Systems. In Proceedings of the Winter 1988
France, October, 1997. USENIX Technical Conference. Dallas, TX,
[25] Energy-Efficient Technologies for the February, 1988.
Dismounted Soldier Board on Army Science and [37] Strom, R.E., Yemini, S. Optimistic Recovery in
Technology, National Research Council, Distributed Systems.ACM Transactions on
Washington, DC, 1997. Computer Systems 3(3), August, 1985.
[26] Parnas, D.L. On the Criteria to be used in [38] Tait, C.D., Duchamp, D.An Efficient Variable-
Decomposing Systems into Modules. Consistency Replicated File Service.In
Communications of the ACM 15(12), December, Proceedings of the USENIX File Systems
1972. Workshop. Ann Arbor,MI, May, 1992.
[27] Royer, E.M., Toh, C.K.A Review of Current [39] Terry, D.B., Theimer, M.M., Petersen, K.,
Routing Protocols for Ad Hoc Mobile Wireless Demers, A.J., Spreitzer,M.J., Hauser, C.H.
Networks. IEEE Personal Communications 6(2), Managing Update Conflicts in a Weakly
April, 1999. Connected Replicated Storage System. In
[28] Saltzer, J.H., Reed, D.P., Clark, D.D. End-to- Proceedings of the 15th ACM Symposium on
End Arguments in System Design.ACM Operating Systems Principles. Copper Mountain
Transactions on Computer Systems 2(4), Resort, CO, December, 1995.
November, 1984. [40] Truman, T.E., Pering, T., Doering, R.,
[29] Satyanarayanan, M.Caching Trust Rather Than Brodersen, R.W.The InfoPad Multimedia
Content. Operating System Review 34(4), Terminal:A Portable Device for Wireless
October, 2000. Information Access. IEEE Transactions on
Computers 47(10), October, 1998.
International Journal of Computer Science and Network (IJCSN)
Volume 1, Issue 3, June 2012 www.ijcsn.org ISSN 2277-5420
[41] Voelker, G.M., Bershad, B.N.Mobisaic: An 8. Gooley, Christopher J. and Saponas, T. Scott. (2002).
Information System for a Mobile Wireless Privacy issues in the aware home.
Computing Environment. In Proceedings of the 9. MIT Project Oxygen. (2003). MIT Project Oxygen:
Workshop on Mobile Computing Systems and pervasive, human-centered computing. Retrieved on April
Applications. Santa Cruz, CA, December, 1994. 29, 2003, from http://oxygen.lcs.mit.edu/.
[42] Want, R., Hopper, A., Falcao, V., Gibbons, J.The 10. Ubiquitous Computing Movies. (1995). Retrieved on
Active Badge Location System.ACM April 29, 2003, from
Transactions on Information Systems 10(1), http://www.ubiq.com/hypertext/weiser/UbiMovies.html.
January, 1992. 11. Weiser, Dr. Mark and Brown, John Seely. (1996).
[43] Ward, A., Jones, A., Hopper, A.A New Location The coming Age of Calm Technology. Retrieved on April
Technique for the Active Office. IEEE Personal 26, 2003, from
Communications 4(5), October, 1997. http://www.ubiq.com/hypertext/weiser/acmfuture2endnote
[44] Weiser, M.The Computer for the 21st .htm.
Century.Scientific American , September, 1991. 12. Weiser, Dr. Mark. (1996). Ubiquitous computing.
[45] Weiser, M., Welch, B., Demers, A., Shenker, S. Retrieved on April 17, 2003, from
Scheduling for reduced CPU energy.In http://www.ubiq.com/hypertext/weiser/UbiHome.html.
Proceedings of the First USENIX Symposium on 13. Weiser, Dr. Mark. (1993). Some computer science
Operating System Design and Implementation. issues in ubiquitous computing. Retrieved April 23, 2003,
Monterey, CA, November,1994. from
[46] Weiser, M, Brown, J.S.The Coming Age of Calm http://nano.xerox.com/hypertext/weiser/UbiCACM.html.
Technology.In Denning, P.J., Metcalfe, R.M.
(editors), Beyond Calculation: The Next Fifty
Years of Computing. Copernicus, 1998
Bibliography