0% found this document useful (0 votes)
7 views

Pervasive computing

The document discusses mobile and pervasive computing, highlighting the distinction between mobile communication, which focuses on data transmission, and mobile computing, which involves performing computing tasks on mobile devices. It covers various applications and innovations in mobile computing, such as mobile banking, healthcare, and gaming, as well as the integration of wired and wireless networks. Additionally, it explores pervasive computing, emphasizing its characteristics, principles, and the vision of embedding computing into everyday objects to enhance user experience.

Uploaded by

Jeffy Shiny
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as ODT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
7 views

Pervasive computing

The document discusses mobile and pervasive computing, highlighting the distinction between mobile communication, which focuses on data transmission, and mobile computing, which involves performing computing tasks on mobile devices. It covers various applications and innovations in mobile computing, such as mobile banking, healthcare, and gaming, as well as the integration of wired and wireless networks. Additionally, it explores pervasive computing, emphasizing its characteristics, principles, and the vision of embedding computing into everyday objects to enhance user experience.

Uploaded by

Jeffy Shiny
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as ODT, PDF, TXT or read online on Scribd
You are on page 1/ 14

Unit 1

Mobile and pervasive computing.


Difference between mobile computing and mobile
communication:

Mobile communication refers to the exchange of information or data


between mobile devices or between a mobile device and a network or
server. This includes sending and receiving voice calls, text messages,
multimedia messages, and accessing the internet through a mobile
network.

On the other hand, mobile computing refers to the use of mobile


devices to perform computing tasks. This includes using mobile apps,
browsing the internet, accessing cloud services, and performing tasks
that would traditionally be done on a desktop or laptop computer.

While both mobile communication and mobile computing involve the


use of mobile devices, the key difference is that mobile
communication focuses on the transmission of data, while mobile
computing focuses on the processing and use of data.

Mobile communication involves the use of wireless technology to


transmit data or information between mobile devices or between a
mobile device and a network. This technology includes cellular
networks, Wi-Fi, Bluetooth, and satellite communications. Mobile
communication is an essential part of modern life, enabling people to
stay connected with friends and family, conduct business, and access
information on the go.

Mobile computing, on the other hand, involves the use of mobile


devices, such as smartphones, tablets, and wearable devices, to
perform computing tasks. These tasks can range from simple
activities like checking emails, browsing the internet, and using
mobile apps, to more complex activities like video editing,
programming, and data analysis. Mobile computing is becoming
increasingly important in today's world, as more and more people rely
on mobile devices to access information and perform tasks.
While mobile communication and mobile computing are distinct
concepts, they are often intertwined. Mobile devices are not only used
to access information and perform tasks, but they are also used to
communicate with others. Mobile communication technologies are
also used to transmit data between mobile devices and networks,
which enables mobile computing to be possible.
Context and names:
Mobile computing is a broad term that encompasses various
technologies and applications that enable users to perform computing
tasks while on the go. Some examples of mobile computing include:

Smartphones: These are mobile devices that offer a range of


computing capabilities, including internet browsing, email,
messaging, social media, and mobile apps.

Tablets: These are portable computing devices that are larger than
smartphones but smaller than laptops. They offer similar capabilities
to smartphones but with a larger screen size.

Wearable devices: These include smartwatches, fitness trackers, and


other devices that can be worn on the body. They typically offer
limited computing capabilities but are designed to be always on and
always connected.

Laptops: While not strictly "mobile" devices, laptops are designed to


be portable and can be used for mobile computing tasks.

Cloud services: These are online services that enable users to access
computing resources and applications from anywhere with an internet
connection.

Mobile computing is becoming increasingly important in today's


world, as more and more people rely on mobile devices to stay
connected and access information while on the go. The trend towards
remote work and online learning has also accelerated the adoption of
mobile computing technologies.
Application and services of mobile computing:

Mobile computing has revolutionized the way people live, work, and
interact with technology. Some of the most common applications and
services of mobile computing include:

Mobile apps: Mobile apps are software applications designed to run


on mobile devices such as smartphones and tablets. They offer a wide
range of services, from entertainment to productivity, social media,
education, and more.

Mobile banking: Mobile banking allows customers to perform


banking transactions using their mobile devices. They can check their
account balances, transfer funds, pay bills, and more.

Mobile commerce: Also known as m-commerce, this is the buying


and selling of goods and services using mobile devices. This can
include mobile payment systems, mobile shopping apps, and mobile
marketplaces.

Mobile gaming: Mobile gaming has become a massive industry, with


millions of people playing games on their mobile devices. Mobile
games range from simple puzzle games to complex multiplayer
games.

Mobile healthcare: Mobile healthcare, or mHealth, uses mobile


devices to provide health services and information. This can include
mobile health apps, remote monitoring devices, and telemedicine.

Location-based services: These are services that use the location of a


mobile device to provide information or services. Examples include
GPS navigation, location-based advertising, and social networking
services that allow users to find nearby friends and events.

Overall, mobile computing has transformed the way people interact


with technology and has enabled a wide range of new applications
and services that were not possible before. With the increasing power
and capabilities of mobile devices, the possibilities for mobile
computing are endless.
New applications:
Mobile computing is a rapidly evolving field, and there are constantly
new applications and use cases emerging. Here are some of the latest
developments in mobile computing:

Augmented reality (AR) and virtual reality (VR): AR and VR are


technologies that allow users to interact with digital content in real-
world environments. Mobile devices are increasingly being used as a
platform for AR and VR experiences, enabling users to explore virtual
environments and interact with digital objects.

Artificial intelligence (AI): Mobile devices are becoming more


powerful, and AI algorithms are becoming more advanced. This has
led to the development of AI-powered mobile apps and services that
can perform a wide range of tasks, such as image recognition, speech
recognition, and natural language processing.

Mobile commerce innovations: Mobile commerce is constantly


evolving, with new innovations emerging all the time. For example,
mobile devices are being used to make in-store payments, to scan
products and compare prices, and to track packages in real-time.

Mobile healthcare innovations: mHealth is a rapidly growing field,


and mobile devices are increasingly being used to deliver healthcare
services remotely. For example, mobile devices can be used to
monitor vital signs, to provide medication reminders, and to deliver
telemedicine services.

Mobile gaming innovations: Mobile gaming is a huge industry, and


developers are constantly pushing the boundaries of what is possible
on mobile devices. For example, mobile devices are increasingly
being used to deliver high-quality, console-like gaming experiences,
and to enable multiplayer gaming with users around the world.
Overall, mobile computing is a dynamic and rapidly evolving field,
and there are always new applications and use cases emerging. As
mobile devices become more powerful and more ubiquitous, the
possibilities for mobile computing are truly endless.
Making legacy application mobile enabled:

Mobile-enabling a legacy application involves adapting an existing


application to run on mobile devices such as smartphones and tablets.
The process can involve several steps, including redesigning the user
interface, optimizing the application for smaller screens and touch
input, and integrating with mobile-specific features such as location
services and camera functionality.

Here are some general steps that you can follow to make a legacy
application mobile-enabled:

Assess the application: Before making any changes to the


application, it is important to assess the existing application and
identify which parts can be modified for mobile devices.

Design a mobile user interface: Redesigning the user interface is


one of the most important steps in mobile-enabling a legacy
application. A mobile user interface should be designed to be
responsive, easy to navigate, and optimized for touch input.

Optimize the application for performance: Mobile devices have


limited resources compared to desktops and servers, so it is important
to optimize the application for performance. This can involve
minimizing the application's memory and CPU usage, as well as
reducing the size of data transfers.

Integrate mobile-specific features: Mobile devices have unique


features such as cameras, GPS, and accelerometers. Integrating these
features into the application can enhance its functionality and provide
a better user experience.
Test and deploy: Once the application has been modified, it is
important to test it thoroughly to ensure that it works correctly on
various mobile devices. Once testing is complete, the application can
be deployed to the mobile app stores or distributed directly to users.
Design consideration of mobile computing:
Mobile computing refers to the use of portable computing devices,
such as smartphones, tablets, and laptops, to access and use digital
information while on the move. When designing a mobile computing
system, there are several key considerations to keep in mind:

Portability: The most important consideration when designing


mobile computing systems is portability. The device should be
lightweight, compact, and easy to carry around. The battery life
should also be optimized to ensure that the device can operate for an
extended period without requiring frequent charging.

User Interface: The user interface should be designed to be easy to


use on a small screen with limited space. The design should be
intuitive and easy to navigate, with touch and gesture-based input
options.

Connectivity: Mobile devices rely on wireless connectivity to access


the internet and communicate with other devices. The device should
support multiple types of wireless connectivity, including Wi-Fi,
cellular data, and Bluetooth.

Security: Mobile devices are often lost or stolen, so security is


critical. The device should include security features like data
encryption, password protection, and remote wiping capabilities.

Processing Power: Mobile devices are often used for resource-


intensive applications like video streaming, gaming, and productivity
software. The device should have enough processing power to handle
these applications without lagging or crashing.
Storage: Mobile devices have limited storage capacity, so the device
should include expandable storage options like microSD cards or
cloud storage.

Durability: Mobile devices are often exposed to harsh environments,


drops, and spills. The device should be designed to withstand these
conditions, with a durable case and reinforced glass screen.

By considering these design considerations, designers can create


mobile computing systems that meet the needs of users while also
being practical and functional.
Integeration of wired and wireless networks:

The integration of wired and wireless networks is becoming


increasingly common as technology advances and more devices
become wireless. This integration allows for a more efficient and
flexible network infrastructure, as well as increased connectivity for
users.

Here are some ways in which wired and wireless networks can be
integrated:

Wireless access points (WAPs): WAPs are devices that allow


wireless devices to connect to a wired network. They are typically
connected to a wired network via Ethernet cables and provide
wireless access to users within a certain range.

Network switches: Network switches are used to connect wired


devices within a network. They can also be used to connect WAPs to
the wired network.

Network bridges: Network bridges are used to connect two separate


networks, such as a wired and a wireless network. They allow devices
on both networks to communicate with each other.
Network routers: Network routers are used to connect multiple
networks and route data between them. They can also be used to
connect wired and wireless networks.

Unified network management: Using a unified network


management system can help manage both wired and wireless
networks. This allows for easier configuration, monitoring, and
troubleshooting of the entire network.

Integrating wired and wireless networks can offer several benefits,


including increased flexibility, mobility, and scalability. However, it's
important to ensure that the network is properly secured to prevent
unauthorized access and protect sensitive data.
Standards bodies:
There are several standards bodies that play a significant role in the
development and advancement of mobile computing technologies.
Some of the most prominent standards bodies include:

Institute of Electrical and Electronics Engineers (IEEE): The


IEEE is a professional association that develops standards for a wide
range of technologies, including mobile computing. Some of its key
standards in this area include IEEE 802.11 (Wi-Fi), IEEE 802.15.1
(Bluetooth), and IEEE 802.16 (WiMAX).

International Telecommunication Union (ITU): The ITU is a


specialized agency of the United Nations that sets standards for
information and communication technologies. It has developed
several standards related to mobile computing, such as the IMT-2000
(3G) and IMT-Advanced (4G) standards.

European Telecommunications Standards Institute (ETSI): The


ETSI is an independent organization that develops standards for
telecommunications technologies. It has developed several standards
related to mobile computing, such as the GSM and UMTS (3G)
standards.
Global System for Mobile Communications Association (GSMA):
The GSMA is an industry organization that represents the interests of
mobile network operators and related companies. It works to develop
standards and promote the adoption of mobile technologies, such as
4G and 5G.

Wi-Fi Alliance: The Wi-Fi Alliance is a non-profit organization that


promotes the use of Wi-Fi technology and develops standards related
to Wi-Fi. It has developed several standards related to mobile
computing, such as Wi-Fi Direct and Wi-Fi Protected Access (WPA).

These standards bodies play a crucial role in ensuring that mobile


computing technologies are interoperable, secure, and reliable. They
also help to promote innovation and competition in the industry,
which can lead to better products and services for consumers.

Pervasive computing:
Pervasive Computing is also called as Ubiquitous computing, and it
is the new trend toward embedding everyday objects with
microprocessors so that they can communicate information. It refers
to the presence of computers in common objects found all around us
so that people are unaware of their presence. All these devices
communicate with each other over wireless networks without the
interaction of the user.
Pervasive computing is a combination of three technologies, namely:
1. Micro electronic technology:
This technology gives small powerful device and display with low
energy consumption.
2. Digital communication technology:
This technology provides higher bandwidth, higher data transfer rate
at lower costs and with world wide roaming.
3. The Internet standardization:
This standardization is done through various standardization bodies
and industry to give the framework for combining all components into
an interoperable system with security, service and billing systems.
Thus, wireless communication, consumer electronics and computer
technology were all merged into one to create a new environment
called pervasive computing environment. It helps to access
information and render modern administration in areas that do not
have a traditional wire-based computing environment.
Pervasive computing will provide us with small portable personal
assistant devices having high speed, wireless communication, lower
power consumption rate, data storage in persistent memory, coin sized
disk device, small color display video and speech processing
technology. All these features will give the users freedom to
effectively communicate and access information from any place in the
world at any time.
Key Characteristics of Pervasive computing:
1. Many devices can be integrated into one system for multi-
purpose uses.
2. A huge number of various interfaces can be used to build an
optimized user interface.
3. Concurrent operation of online and offline supported.
4. A large number of specialized computers are integrated through
local buses and Internet.
5. Security elements are added to prevent misuse and
unauthorized access.
6. Personalization of functions adapts the systems to the user’s
preferences, so that no PC knowledge is required of the user to use
and manage the system.
These type of functions can be extended into network operations for
use in workplace, home and mobile environments.
Applications:
There are a rising number of pervasive devices available in the market
nowadays. The areas of application of these devices include:
 Retail
 Airlines booking and check-in
 Sales force automation
 Healthcare
 Tracking
 Car information System
 Email access via WAP (Wireless Application Protocol) and voice.
For example, in retail industry, there is a requirement for faster and
cheaper methods to bring goods to the consumer from stores via
Internet. Mobile computers are provided with bar code readers for
tracking the product during manufacture. Currently consumers use
computers to select products. In future, they will use PDA (Personal
Digital Assistant) and pervasive devices in the domestic markets too.
When they complete writing the list of items to be bought on these
devices, this list can then be sent to the supermarket, and purchase can
be delivered to the consumer.
The advantages of this are faster processing of data and execution of
data mining.
Four Principles of Pervasive Computing
There are four key principles of pervasive computing:

Decentralisation. All computing is done by basic, small devices that


are unintelligent, yet communicate in an open community where the
structure of connections changes dynamically. (The Hive concept)

Diversification. Devices are small and special purpose, supplying a


few, or even just one type of information.

Connectivity. Dumb devices can produce powerful and intelligent


behaviour, if multiple devices act in parallel linked by an underlying
infrastructure eg. the Internet.

Simplicity. We must never notice that it exists. If people have to


constantly tweak, adjust, enter data to manage the connections, then the
hive will never become pervasive. The standards need to be open, to
be as non restrictive as possible, (O’Hara et al, 2008).

Pervasive computing devices have evolved to include:

 laptops;

 notebooks;

 smartphones;
 tablets;

 wearable devices;

and sensors (for example, on fleet management and pipeline


components, lighting systems, appliances).
Basics and vision of pervasive computing:
Pervasive computing, also known as ubiquitous computing, is a
concept in computer science that describes a future in which computing
is embedded in everyday objects and environments, creating a seamless
and ubiquitous computing experience for users. The vision of pervasive
computing is to create a world in which computing is no longer
confined to specific devices or locations, but is integrated into the
fabric of everyday life.

At its core, pervasive computing involves the integration of sensors,


computing devices, and networking technologies into everyday objects
and environments, allowing them to collect and share data with each
other and with users. This data can then be used to automate processes,
improve efficiency, and enhance the user experience.

Some of the key features and characteristics of pervasive computing


include:

Embeddedness: Pervasive computing involves the integration of


computing and communication technologies into everyday objects,
making them part of the environment and reducing the need for explicit
user interaction.

Context-awareness: Pervasive computing systems are designed to be


aware of their context and to adapt their behavior accordingly. This can
include adapting to changes in the environment, detecting user needs
and preferences, and responding to changes in user behavior.
Connectivity: Pervasive computing systems rely on networked
communication to collect and share data. This can include wireless
technologies such as Bluetooth, Wi-Fi, and cellular networks.

Autonomy: Pervasive computing systems are designed to operate


autonomously, without the need for explicit user input. They are able to
detect and respond to changes in the environment and user behavior,
and to make decisions based on that information.

The vision of pervasive computing is to create a world in which


computing is seamlessly integrated into everyday life, enhancing the
user experience and enabling new forms of interaction and automation.
Some examples of applications of pervasive computing include smart
homes, intelligent transportation systems, and wearable computing
devices.
Categories of pervasive devices:
Pervasive devices, also known as ubiquitous or embedded devices,
refer to small computing devices that are integrated into everyday
objects and environments to provide various functions and services.
The categories of pervasive devices can be broadly classified as
follows:

Wearable devices: These devices are worn on the body and are
designed to track health and fitness data, monitor vital signs, and
provide notifications. Examples include smartwatches, fitness trackers,
and health monitors.

Smart home devices: These devices are integrated into home


appliances and systems to provide automated control, energy
management, and security. Examples include smart thermostats, home
security systems, and smart lighting systems.
Industrial IoT devices: These devices are designed for industrial and
commercial applications, such as manufacturing, transportation, and
logistics. Examples include sensors, actuators, and other connected
devices used in supply chain management, asset tracking, and
predictive maintenance.

Automotive IoT devices: These devices are used in automobiles to


provide advanced driver assistance, connectivity, and infotainment
features. Examples include navigation systems, collision avoidance
systems, and entertainment systems.

Healthcare IoT devices: These devices are used in medical settings to


monitor patient health, track medication, and manage medical
equipment. Examples include wearable health monitors, medication
dispensers, and hospital asset tracking systems.

Consumer IoT devices: These devices are designed for personal use
and include a wide range of products such as smart speakers, smart
locks, and smart cameras.

Overall, the categories of pervasive devices are diverse, and their


applications are rapidly expanding, leading to increased connectivity
and improved efficiency across various industries and domains.

You might also like