Preview

Pervasive Computing

Best Essays
Open Document
Open Document
4584 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Pervasive Computing
Pervasive Computing: An Overview
Prashanth G.K [1] Assistant Professor, Sushil Kumar Singh[2] Project Student Sarmistha Panda[2] Project Student Department of MCA, Siddaganga Institute of Technology, Tumkur, India, prashanthgk@gmail.com Kumar.sushil.singh24@gmail.com sarm.prad@gmail.com Abstract Pervasive computing environments gracefully integrate networked computing devices – from tiny sensors to extremely dynamic and powerful devices – with people and their ambient environments. Service discovery is an essential element for pervasive computing to achieve “anytime, anywhere” computing without requiring users’ active attention to computing devices and network services. Privacy and security issues are to be considered in the future. It is growing rapidly in developing area such as Information and Communications Technology (ICT). The term refers to the increasing integration of ICT into people’s lives and environments, made possible by the growing availability of microprocessors with inbuilt communications facilities. It has many potential applications, in medical area and home care to environmental monitoring and intelligent transport systems. This paper makes an overview of pervasive computing and discusses the growing debate over privacy, safety and environmental implications. Keywords- Device, Connectivity, User Interface, Applications, Technological Issues, Safety and Security, Privacy. 1. Introduction The meaning of Pervasive is ―existing in all parts of a place or thing‖. Eight billion embedded microprocessors1 are produced each year. This number is expected to rise dramatically over the next decade, making electronic devices ever more pervasive. These devices will range from a few millimeters in size (small sensors) to several meters (displays and surfaces). They may be interconnected via wired and wireless technologies into broader, more capable, networks. Pervasive computing systems (PCS) and services may lead to a greater degree of user knowledge of, or

You May Also Find These Documents Helpful

  • Best Essays

    The information technology advancements continue to impact the workplace, societies and cultures. In today’s world, information technology is almost part of every business, educational institute, and even personal activity (Brooks, 2010). Computer and internet access have found their way to households, schools, libraries, people’s cell phones, banks, hospitals, governments, coffee shops, and other public places. As the industry evolves, so do the needs and special niches of society from mainframe systems, to micro systems, to PC-based LAN and WAN systems, to virtual systems and the internet.…

    • 1836 Words
    • 8 Pages
    Best Essays
  • Best Essays

    Tiny, portable gadgets, such as pocket digital assistants (PDAs) and mobile phones have been in the recent years pushed on the mark. Mobile or ubiquitous computing and handy gadgets are changing the relations between computers and humans.there is an introduction of a new communication approach based on context. This approach enables people to interact with computers, objects and environments seamlessly. Mobile computing devices have enabled composite cooperation and communication patterns that were not dreamt of in the past years. They possess vital features in portability, ability to share information using communication networks; wireless, and synchronizing the information with other standardized gadgets. There have drastic changes in the technological landscape in the past years led by the emergence of mobile computing devices focusing on consumer preferences.…

    • 1381 Words
    • 6 Pages
    Best Essays
  • Good Essays

    The recent breakthroughs in modern technology has been so rapid that even today’s generation who are highly dependent on gadgets and gizmos are overwhelmed with the options. Laptop computers no longer bear the weight and mobility problems that its predecessors used to have. Tablets are in abundance that it may even render laptops or netbooks obsolete. Even the ever so dependable smart phones are being develop to…

    • 553 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    The concepts of wireless network security consist of commitment of cyber security and maintaining security based on the latest development and exploits against the network K.W. Ross, J. K. (2012). Wireless Network Security is based on the principles of cryptography, message integrity, authentication, securing e-mails, securing TCP connections: SSL, securing Network layer: IPsec, securing wirelsess: LANs, securing the operational security structure, such as the firewalls and the IDS K.W. Ross, J. K. (2012). This security measure would cover the detection of intrusions, unauthorized usage, authentication, hashing, digital certification, updated security software, network security, hacking prevention, phishing prevention and encryption K.W. Ross, J. K. (2012). There are many risks, threats, and vulnerabilities with online access and usage of the internet, regardless if wired or wireless and all should be secured. Wireless devices communicate through radio without a connection to anything physical Radack, S. (n.d.). The wireless device may be a cell phone, laptop, local area network, remote controls, stereos, personal network, microphones, a headphone, IPad, IPod, etc. It is important to secure the access points because the system may be compromised by unauthorized persons for theft, or other risk factors. The internet could be used by someone unknown, without the user’s permission or knowledge and simply to commit crimes using the user’s credentials. This report will show the importance of securing a wireless system and why it is important.…

    • 1936 Words
    • 8 Pages
    Powerful Essays
  • Good Essays

    Now days, wireless communication and devices are very flexible, convenient, and easy to use everywhere. With the introduction of wireless local area network (WLAN) many users find it very flexible to move laptops from one place to another within the office while maintaining connectivity with the network, sharing data and applications with network system and other users with compatible devices without been tied to printer cables and other peripheral device connection. This is very important in a doctor’s office because patients and doctors move from room to room depends on the type of test they are doing. Having mobile device makes it easier for them to do their jobs easier and it can even help cut wiring costs. In the other hand there are many risks inherent in using wireless and mobile technologies. Wireless networks face the same threats as conventional wired network because intruders who gain access to information systems via wireless communication can bypass firewall protection and expose patient’s information and data. Besides lunching denial of service attacks, insert viruses or malicious code, disable operations, most importantly they can violate the privacy of patients and even steal their identities.…

    • 610 Words
    • 3 Pages
    Good Essays
  • Good Essays

    With the rapid development of computer technology innovations in the Third Industrial Revolution, hardware prices have dropped sufficiently to become the building blocks for further technological innovations and to facilitate the Fourth Industrial Revolution. Technologies have become increasingly embedded in each other and used together. Our devices and equipments are connected to the Internet to communicate and control each other without human intervention. Communication of the objects on the Internet is called the Internet of Things, and the interconnected systems are called cyberphysical systems, which are the basis for many other technology innovations. (Schwab, 2015; Abonyi, Misztlivetz,…

    • 1467 Words
    • 6 Pages
    Good Essays
  • Good Essays

    The use of Technology has increased rapidly around the world, especially in the last few years. In the world today, people now use the new forms of modern technologies like computers, cell phones and many other advanced technology in their day to day life. The information age is dramatically changing people’s daily activities and…

    • 1162 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    Smart Dust

    • 4329 Words
    • 18 Pages

    The current ultramodern technologies are focusing on automation and miniaturization. The decreasing computing device size, increased connectivity and enhanced interaction with the physical world have characterized computing history. Recently, the popularity of small computing devices, such as hand held computers and cell phones; rapidly flourishing internet group and the diminishing size and cost of sensors and especially transistors have accelerated these strengths. The emergence of small computing elements, with sporadic connectivity and increased interaction with the environment, provides enriched opportunities to reshape interactions between people and computers and spur ubiquitous computing researches.…

    • 4329 Words
    • 18 Pages
    Powerful Essays
  • Satisfactory Essays

    Mobile Devices Security

    • 280 Words
    • 2 Pages

    This is my Summary for mobile devices security. I think that mobile computing devices have become a critical tool in today’s networked world. Enterprise and individuals alike rely on mobile devices to remain reachable when away from the office or home. While mobile devices such as smartphones, laptops personal digital assistants PDAs and universal serial bus USB memory sticks have increased convince as well as productivity in the workplace these befits are not without risks.…

    • 280 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Internet of Things is another revolution of the Internet. Objects make themselves unmistakable and they get knowledge by making or empowering setting related choices on account of the way that they can convey data about themselves. They can get to data that has been accumulated by different things, or they can be segments of complex services. This change is associative with the rise of distributed computing capacities and the move of the Internet towards Internet Protocols with a nearly boundless tending to limit.…

    • 914 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    They explain the ethical ethical debates of MDM software on personal devices, discussed the lessons learned from BYOD implementations, as well as the extent of intrusion of a BYOD policy. We learned a great deal of all the sources chosen. For example, there are many benefits in implementing BYOD such as cost saving, health and productivity of employees, as well as new technology implementation. But BYOD implementation does have bottlenecks especially when it comes to MDM software on personal devices. Corporations need to take security measures to ensure their data are protected. Also, from the CIA (Confidentiality, Integrity, and Availability) triad, availability is more supported in the BYOD program whereas Confidentiality and Integrity present some hurdles as it might be challenging to cover these two when it comes to sharing information and who have access to the…

    • 934 Words
    • 4 Pages
    Powerful Essays
  • Powerful Essays

    Bring your own device

    • 3020 Words
    • 13 Pages

    Organizations that do not have IT oversight managing its employees’ mobile devices unintentionally consent to making their assets vulnerable to attack from uninformed user behaviors like improper configuration and risky wireless connections (Search Consumerization). With the mobile market’s flux state adding new emerging technologies rapidly, companies have had to adjust from having their networks only accommodate few devices. Initially, laptops accessed the network through limited VPN concentrators and desktops provided access points for PDAs through synchronization. With new technologies, single devices now may encase several forms of connections: Ethernet, WiFi, Bluetooth, and 3G. Networks now accommodate off-site users through a myriad of application portals and on-site users connected through Wi-Fi accessibility and Bluetooth-enabled desktops. Each connection form provides a unique opportunity for attack. Under BYOD policies, corporations must institute a comprehensive mobile inventory that they manage device discovery. New technological circumstances create scenarios that single devices utilize several connections and individual employees possess many devices of which they may utilize concurrently.…

    • 3020 Words
    • 13 Pages
    Powerful Essays
  • Better Essays

    Mobile Computing is an umbrella term used to describe technologies that enable people to access network services anyplace, anytime, and anywhere. Ubiquitous computing and nomadic computing are synonymous with mobile computing. Information access via a mobile device is plagued by low available bandwidth, poor connection maintenence, poor security, and addressing problems. Unlike their wired counterparts, design of software for mobile devices must consider resource limitation, battery power and display size. Consequently, new hardware and software techniques must be developed. For example, applications need to be highly optimized for space, in order to fit in the limited memory on the mobile devices. For Internet enabled devices, the good old TCP/IP stack cannot be used; it takes too much space and is not optimized for minimal power consumption. Given the plethora of cellular technologies that have emerged in such a market, it becomes extremely difficult to provide support for inter-device communication…

    • 1431 Words
    • 6 Pages
    Better Essays
  • Powerful Essays

    This development is opening up huge opportunities for both the economy and individuals. However, it also involves risks and undoubtedly represents an immense technical and social challenge. The Internet of Things vision is grounded in the belief that the steady advances in microelectronics, communications and information technology we have witnessed in recent years will continue into the foreseeable future. In fact – due to their diminishing size, constantly falling price and declining energy consumption – processors, Communications modules and other electronic components are being increasingly integrated into everyday objects today. “Smart” objects play a key role in the Internet of Things vision, since embedded communication and information technology would have the potential to revolutionize. The utility of these objects. Using sensors, they are able to perceive their context, and via built-in networking capabilities they would be able to communicate with each other, access Internet services and interact with…

    • 1627 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    The Future Mobile

    • 1698 Words
    • 7 Pages

    Advance research Program found that many desires of the market demand for mobiles still remains unsolved. Flytxt limited have at last researched out a Mobile which overcomes almost all the wants of the consumers. The new mobile which it recently modernized is the Glipso.…

    • 1698 Words
    • 7 Pages
    Good Essays

Related Topics