Pervasive Computing
eBook - ePub

Pervasive Computing

Concepts, Technologies and Applications

Minyi Guo, Jingyu Zhou, Feilong Tang, Yao Shen

Share book
  1. 192 pages
  2. English
  3. ePUB (mobile friendly)
  4. Available on iOS & Android
eBook - ePub

Pervasive Computing

Concepts, Technologies and Applications

Minyi Guo, Jingyu Zhou, Feilong Tang, Yao Shen

Book details
Book preview
Table of contents
Citations

About This Book

This book introduces fundamental concepts and theories in pervasive computing as well as its key technologies and applications. It explains how to design and implement pervasive middleware and real application systems, covering nearly all aspects related to pervasive computing. Key technologies in the book include pervasive computing-oriented resource management and task migration, mobile pervasive transaction, human computer interface, and context collection-oriented wireless sensor networks.

Frequently asked questions

How do I cancel my subscription?
Simply head over to the account section in settings and click on “Cancel Subscription” - it’s as simple as that. After you cancel, your membership will stay active for the remainder of the time you’ve paid for. Learn more here.
Can/how do I download books?
At the moment all of our mobile-responsive ePub books are available to download via the app. Most of our PDFs are also available to download and we're working on making the final remaining ones downloadable now. Learn more here.
What is the difference between the pricing plans?
Both plans give you full access to the library and all of Perlego’s features. The only differences are the price and subscription period: With the annual plan you’ll save around 30% compared to 12 months on the monthly plan.
What is Perlego?
We are an online textbook subscription service, where you can get access to an entire online library for less than the price of a single book per month. With over 1 million books across 1000+ topics, we’ve got you covered! Learn more here.
Do you support text-to-speech?
Look out for the read-aloud symbol on your next book to see if you can listen to it. The read-aloud tool reads text aloud for you, highlighting the text as it is being read. You can pause it, speed it up and slow it down. Learn more here.
Is Pervasive Computing an online PDF/ePUB?
Yes, you can access Pervasive Computing by Minyi Guo, Jingyu Zhou, Feilong Tang, Yao Shen in PDF and/or ePUB format, as well as other popular books in Computer Science & Information Technology. We have over one million books available in our catalogue for you to explore.

Information

Publisher
CRC Press
Year
2016
ISBN
9781315356457
Edition
1
Chapter 1
Pervasive Computing Concepts
Since Mark Weiser first coined the phrase ubiquitous computing in 1988, when he was the chief technology officer at Xerox’s Palo Alto Research Center (PARC), the development of pervasive/ubiquitous computing has continued for more than quarter century. During this period, the popularization of mobile Internet devices such as smartphones and smart pads has led to the core perspective of pervasive computing (that of computing devices being available everywhere at any time) becoming the main trend in computing and information technology. As part of our daily lives, these devices help us connect to worldwide networks without boundaries and provide us with quick and secure access to a wealth of information and services.
This book aims to introduce a foundation of the concepts, architecture, key techniques, and typical applications of pervasive computing. The main body of this book focuses on context awareness, resource management, human–computer interface, pervasive transaction processing, and user preference discovery—all of which have been previously researched by our team.
1.1 Perspectives of Pervasive Computing
To help convey the look and feel of such a world, we present two hypothetical scenarios.
The first scenario involves a traveler. Dr. John is driving his car on a long distance trip. Along the way, the car detects when fuel will be used up, and it then automatically searches for gas stations nearby. In a short time, the car finds an appropriate location that can provide fuel at the lowest price among gas stations within 1 km. The pervasive device displays a suggestion to John and guides him to the selected gas station. Two hours later, it is lunch time and John is hungry. The pervasive devices search for an appropriate restaurant near John’s current location, according to his food preferences.
Our second scenario focuses on daily life. Professor Li is watching a video in his office using a personal computer (PC) when he receives a call asking him to attend a meeting. On his way there, John continues to watch the video using his smartphone. A pervasive computing system will recover the point in the video where John stopped watching it on his PC and will automatically download a low-resolution video to John’s smartphone (which has a low-resolution screen), connecting with the video server through a low-bandwidth wireless channel. In this case, the complex switch process is completely unnoticed by Professor Li.
From these scenarios, we observe that the whole is much greater than the sum of its parts. In other words, the real research takes place with the seamless integration of component technologies into a system such as iShadow [1].
1.1.1 Technology Trend Overview
The advancement of mobile computing, cloud computing, wearable computing, and smart devices has brought unprecedented opportunities for pervasive computing. In recent years, we have seen a sharp rise in the shipment of smartphones and smart pads. These mobile devices are equipped with multicore central processing units (CPUs), gigabytes of memory, Wi-Fi and cellular communication components, a global positioning system (GPS), and other sensors. As a result, in the not too distant future, they will have more powerful information storage and processing capabilities than desktop computers. In the meantime, millions of apps have been developed for these mobile devices that provide a wide variety of personalized services.
Previous pervasive computing was often limited by the physical size of the electronic devices. However, this constraint has been overcome by rapid technological developments. A variety of wearable devices have entered the mass market, such as Google Glass, Jawbone UP [2], Nike FuelBand [3], and Sony SmartWatch [4]. These wearable devices have successfully extended computation, storage, and communication capabilities to personal gadgets, providing a unique opportunity for expanding the sensing capabilities of users and offering situation-aware information. For instance, a user with a Google Glass may visualize the transit route of nearby metro stations within the device’s screen.
Additionally, many traditional appliances are now embedded with sensors and communication components, thus making them smarter. For instance, the Smart Sofa [5] can identify the people sitting on it using programmable sensors in the sofa legs and can address users with personalized greetings.
1.1.2 Pervasive Computing: Concepts
Pervasive computing is a new wave of technology where computing takes place everywhere and anywhere. The goal of pervasive computing is to become a technology that disappears [6]. Pervasive computing can be seen as an enabler technology for many new and exciting applications, making information accessible to anyone, anywhere, and at any time [7].
Pervasive computing saw rapid growth in the past few decades due to a shift from a technology perspective to a utility and usability perspective. Pervasive computing, although currently used in today’s fast-paced lifestyle, will also be the future of this transition [8].
Pervasive computing projects have emerged at major universities and in industry. For example, Carnegie Mellon University, the University of California at Berkeley (UC Berkeley), Massachusetts Institute of Technology (MIT), and the University of Washington set up the Aura, Endeavour, Oxygen, and Portolano projects, respectively. These represent a broad communal effort to make pervasive computing a reality, focusing on technology that is more social and more people oriented [6].
1.2 Challenges
Although pervasive computing offers a lot of new, interesting, and useful possibilities, many challenges need to be overcome before the vision becomes real. The main challenges faced in pervasive computing are as follows [6]:
1. Transparency. Pervasive computing is people-oriented, providing transparent services based on individual requirements, preferences, and so on. In contrast to desktop computing, pervasive computing can use any device, in any location, and in any format, without an individual being consciously aware of what is taking place with respect to the actual computing.
2. Context awareness. Typically, pervasive computing systems are very tightly connected with specific users. Pervasive computing systems often gather and store information on the user’s behavior, context, habits, and planning. This information forms the basis for the many benefits the system can offer individual users.
3. Mobility. The omnipresence of ubiquitous applications typically is achieved by either having devices move with the user or by having applications move among mobile users’ devices. In both cases, applications need to adapt to the moving environment, which involves maintaining device connections and adapting protocol for handling mobility. Although some of the problems can be addressed by routing and handovers, many cannot be solved at the network level because knowledge of application semantics is required for runtime adaptation.
4. Heterogeneous devices. Pervasive applications typically involve many different types of devices working in an orchestrated way. As a user moves around in an environment, the servicing application often moves with him. For instance, the application may switch from a desktop PC to a mobile phone. In addition, the heterogeneous devices complicate the development of high-level applications because different devices provide varied programming interfaces, resource abstractions, and functional capabilities.
5. Data management. In a pervasive environment, many devices continuously produce huge amounts of raw data. It is challenging to transfer, store, and process these data. In order to provide meaningful semantics for high-level applications, some preprocessing of the data may be necessary. For instance, inaccurate data can cause context management systems to produce false context information, which can result in incorrect reasoning for applications.
6. Fault tolerance. The pervasive application requires harmonious cooperation among many hardware devices and various software components. However, hardware devices such as sensors are prone to failures, and software components can often malfunction. Both types of failures can hamper the effectiveness of pervasive applications. Thus, fault tolerance measures must be built into the system to avoid serious or fatal consequences for users.
7. Reliability. Pervasive computing systems normally are embedded in the environment not only for gathering information but also for making decisions or at least for decision support. Limited resources and unstable wireless communication can impact the reliability of pervasive computing, making its application a more arduous task.
8. Usability. Pervasive computing means that smart and agile computing devices, though invisible, are embedded everywhere in the environment. Therefore, usability is the critical success factor for these applications, making this the hottest research topic in the field of pervasive computing. An easy-to-use and intuitive interface is the demand of the future [9]. Ease of use will follow different levels for different end users. Usability in pervasive computing applications is very important and requires more attention than all other areas, such as desktop and Web-based applications.
1.3 Technology
As noted in Section 1.1.1, pervasive computing involves state-of-the-art technology—such as a middleware and programming model, context-awareness computing, resource allocation and management, human–computer interaction (HCI), pervasive transaction processing, and data mining. We briefly discuss these aspects here.
1.3.1 Middleware
Pervasive applications often rely on some middleware support. This is not a coincidence. Application programmers face a large variety of challenges, such as data management, context management, security and privacy issues, and mobility. Solving these problems for each application is error prone and inefficient. Thus, it is more desirable to extract the common requirements from different applications and provide the desired functionality from a middleware layer, which hides the complexity and heterogeneity of underlying hardware and network platforms.
The pervasive middleware primarily addresses issues from high-level applications on one hand while dealing with the complexity of operating underlying devices, networks, and platforms on the other. High-level application requirements are often diverse and application specific, with the common themes being context awareness, locality, reliability, adaptability, and reusability.
The operations of pervasive middleware are realized by heterogeneous underlying devices, networks, and platforms. In practice, these operations are also constrained by physical resources, such as low computation capability and insufficient battery supply. As a result, the middleware must strike a balance between functionality provided for the application layer and the resource usage of underlying hardware devices. In different scenarios, one aspect of consideration can outweigh the other and can affect design decisions.
1.3.2 Context Awareness
Context refers to the pieces of information that capture the characteristics of pervasive computing environments [9,10]. We classify these into physical and virtual contexts based on context sources [11]. Physical contexts may be aggregated by physical sources, for example, sensing and computational devices such as handheld devices, wireless sensors, and Radio Frequency Identification (RFID), which involve accelerated speed, air pressure, light, location, movement, sound, touch, and temperature. Virtual contexts are specified by users or captured from user interactions—including user preferences, business processes, goals, and tasks.
Context awareness is a mechanism that assists pervasive applications in adapting their behaviors to the evolving contexts [12]. Suppose a call comes when Alice is watching Kung Fu Panda in her smart bedroom. Depending upon the urgency of the call and the caller’s relationship with Alice, this smart space adapts its behavior correspondingly (i.e., it will reject or accept the call). Most pervasive applications achieve context awareness in a similar fashion. They first acquire physical and virtual contexts and then exploit these contexts to determine what strategy should be taken when contexts keep evolving.
This book will cover the physical and virtual aspects through discussions of wireless sensor networking, user tracking, and context reasoning. Using wireless sensors is a basic, common, and effective way to gather physical contexts for pervasive applications. In a smart space, the architectural design of a wireless sensor network is a key challenge for achieving scalability, robustness, and balanced energy dissipation of the network. Location information is the most important context in pervasive computing. Accurate user tracking facilitates the provision of service in smart spaces. Based on context information, reasoning enables context awareness for pervasive applications. In this book, evidence theory, the Dempster–Shafer theory of context reasoning, evidence propagation, and evidence selection strategy will be discussed extensively.
1.3.3 Resource...

Table of contents