Pervasive Computing
eBook - ePub

Pervasive Computing

Concepts, Technologies and Applications

Minyi Guo, Jingyu Zhou, Feilong Tang, Yao Shen

Compartir libro
  1. 192 páginas
  2. English
  3. ePUB (apto para móviles)
  4. Disponible en iOS y Android
eBook - ePub

Pervasive Computing

Concepts, Technologies and Applications

Minyi Guo, Jingyu Zhou, Feilong Tang, Yao Shen

Detalles del libro
Vista previa del libro
Índice
Citas

Información del libro

This book introduces fundamental concepts and theories in pervasive computing as well as its key technologies and applications. It explains how to design and implement pervasive middleware and real application systems, covering nearly all aspects related to pervasive computing. Key technologies in the book include pervasive computing-oriented resource management and task migration, mobile pervasive transaction, human computer interface, and context collection-oriented wireless sensor networks.

Preguntas frecuentes

¿Cómo cancelo mi suscripción?
Simplemente, dirígete a la sección ajustes de la cuenta y haz clic en «Cancelar suscripción». Así de sencillo. Después de cancelar tu suscripción, esta permanecerá activa el tiempo restante que hayas pagado. Obtén más información aquí.
¿Cómo descargo los libros?
Por el momento, todos nuestros libros ePub adaptables a dispositivos móviles se pueden descargar a través de la aplicación. La mayor parte de nuestros PDF también se puede descargar y ya estamos trabajando para que el resto también sea descargable. Obtén más información aquí.
¿En qué se diferencian los planes de precios?
Ambos planes te permiten acceder por completo a la biblioteca y a todas las funciones de Perlego. Las únicas diferencias son el precio y el período de suscripción: con el plan anual ahorrarás en torno a un 30 % en comparación con 12 meses de un plan mensual.
¿Qué es Perlego?
Somos un servicio de suscripción de libros de texto en línea que te permite acceder a toda una biblioteca en línea por menos de lo que cuesta un libro al mes. Con más de un millón de libros sobre más de 1000 categorías, ¡tenemos todo lo que necesitas! Obtén más información aquí.
¿Perlego ofrece la función de texto a voz?
Busca el símbolo de lectura en voz alta en tu próximo libro para ver si puedes escucharlo. La herramienta de lectura en voz alta lee el texto en voz alta por ti, resaltando el texto a medida que se lee. Puedes pausarla, acelerarla y ralentizarla. Obtén más información aquí.
¿Es Pervasive Computing un PDF/ePUB en línea?
Sí, puedes acceder a Pervasive Computing de Minyi Guo, Jingyu Zhou, Feilong Tang, Yao Shen en formato PDF o ePUB, así como a otros libros populares de Computer Science y Information Technology. Tenemos más de un millón de libros disponibles en nuestro catálogo para que explores.

Información

Editorial
CRC Press
Año
2016
ISBN
9781315356457
Edición
1
Chapter 1
Pervasive Computing Concepts
Since Mark Weiser first coined the phrase ubiquitous computing in 1988, when he was the chief technology officer at Xerox’s Palo Alto Research Center (PARC), the development of pervasive/ubiquitous computing has continued for more than quarter century. During this period, the popularization of mobile Internet devices such as smartphones and smart pads has led to the core perspective of pervasive computing (that of computing devices being available everywhere at any time) becoming the main trend in computing and information technology. As part of our daily lives, these devices help us connect to worldwide networks without boundaries and provide us with quick and secure access to a wealth of information and services.
This book aims to introduce a foundation of the concepts, architecture, key techniques, and typical applications of pervasive computing. The main body of this book focuses on context awareness, resource management, human–computer interface, pervasive transaction processing, and user preference discovery—all of which have been previously researched by our team.
1.1 Perspectives of Pervasive Computing
To help convey the look and feel of such a world, we present two hypothetical scenarios.
The first scenario involves a traveler. Dr. John is driving his car on a long distance trip. Along the way, the car detects when fuel will be used up, and it then automatically searches for gas stations nearby. In a short time, the car finds an appropriate location that can provide fuel at the lowest price among gas stations within 1 km. The pervasive device displays a suggestion to John and guides him to the selected gas station. Two hours later, it is lunch time and John is hungry. The pervasive devices search for an appropriate restaurant near John’s current location, according to his food preferences.
Our second scenario focuses on daily life. Professor Li is watching a video in his office using a personal computer (PC) when he receives a call asking him to attend a meeting. On his way there, John continues to watch the video using his smartphone. A pervasive computing system will recover the point in the video where John stopped watching it on his PC and will automatically download a low-resolution video to John’s smartphone (which has a low-resolution screen), connecting with the video server through a low-bandwidth wireless channel. In this case, the complex switch process is completely unnoticed by Professor Li.
From these scenarios, we observe that the whole is much greater than the sum of its parts. In other words, the real research takes place with the seamless integration of component technologies into a system such as iShadow [1].
1.1.1 Technology Trend Overview
The advancement of mobile computing, cloud computing, wearable computing, and smart devices has brought unprecedented opportunities for pervasive computing. In recent years, we have seen a sharp rise in the shipment of smartphones and smart pads. These mobile devices are equipped with multicore central processing units (CPUs), gigabytes of memory, Wi-Fi and cellular communication components, a global positioning system (GPS), and other sensors. As a result, in the not too distant future, they will have more powerful information storage and processing capabilities than desktop computers. In the meantime, millions of apps have been developed for these mobile devices that provide a wide variety of personalized services.
Previous pervasive computing was often limited by the physical size of the electronic devices. However, this constraint has been overcome by rapid technological developments. A variety of wearable devices have entered the mass market, such as Google Glass, Jawbone UP [2], Nike FuelBand [3], and Sony SmartWatch [4]. These wearable devices have successfully extended computation, storage, and communication capabilities to personal gadgets, providing a unique opportunity for expanding the sensing capabilities of users and offering situation-aware information. For instance, a user with a Google Glass may visualize the transit route of nearby metro stations within the device’s screen.
Additionally, many traditional appliances are now embedded with sensors and communication components, thus making them smarter. For instance, the Smart Sofa [5] can identify the people sitting on it using programmable sensors in the sofa legs and can address users with personalized greetings.
1.1.2 Pervasive Computing: Concepts
Pervasive computing is a new wave of technology where computing takes place everywhere and anywhere. The goal of pervasive computing is to become a technology that disappears [6]. Pervasive computing can be seen as an enabler technology for many new and exciting applications, making information accessible to anyone, anywhere, and at any time [7].
Pervasive computing saw rapid growth in the past few decades due to a shift from a technology perspective to a utility and usability perspective. Pervasive computing, although currently used in today’s fast-paced lifestyle, will also be the future of this transition [8].
Pervasive computing projects have emerged at major universities and in industry. For example, Carnegie Mellon University, the University of California at Berkeley (UC Berkeley), Massachusetts Institute of Technology (MIT), and the University of Washington set up the Aura, Endeavour, Oxygen, and Portolano projects, respectively. These represent a broad communal effort to make pervasive computing a reality, focusing on technology that is more social and more people oriented [6].
1.2 Challenges
Although pervasive computing offers a lot of new, interesting, and useful possibilities, many challenges need to be overcome before the vision becomes real. The main challenges faced in pervasive computing are as follows [6]:
1. Transparency. Pervasive computing is people-oriented, providing transparent services based on individual requirements, preferences, and so on. In contrast to desktop computing, pervasive computing can use any device, in any location, and in any format, without an individual being consciously aware of what is taking place with respect to the actual computing.
2. Context awareness. Typically, pervasive computing systems are very tightly connected with specific users. Pervasive computing systems often gather and store information on the user’s behavior, context, habits, and planning. This information forms the basis for the many benefits the system can offer individual users.
3. Mobility. The omnipresence of ubiquitous applications typically is achieved by either having devices move with the user or by having applications move among mobile users’ devices. In both cases, applications need to adapt to the moving environment, which involves maintaining device connections and adapting protocol for handling mobility. Although some of the problems can be addressed by routing and handovers, many cannot be solved at the network level because knowledge of application semantics is required for runtime adaptation.
4. Heterogeneous devices. Pervasive applications typically involve many different types of devices working in an orchestrated way. As a user moves around in an environment, the servicing application often moves with him. For instance, the application may switch from a desktop PC to a mobile phone. In addition, the heterogeneous devices complicate the development of high-level applications because different devices provide varied programming interfaces, resource abstractions, and functional capabilities.
5. Data management. In a pervasive environment, many devices continuously produce huge amounts of raw data. It is challenging to transfer, store, and process these data. In order to provide meaningful semantics for high-level applications, some preprocessing of the data may be necessary. For instance, inaccurate data can cause context management systems to produce false context information, which can result in incorrect reasoning for applications.
6. Fault tolerance. The pervasive application requires harmonious cooperation among many hardware devices and various software components. However, hardware devices such as sensors are prone to failures, and software components can often malfunction. Both types of failures can hamper the effectiveness of pervasive applications. Thus, fault tolerance measures must be built into the system to avoid serious or fatal consequences for users.
7. Reliability. Pervasive computing systems normally are embedded in the environment not only for gathering information but also for making decisions or at least for decision support. Limited resources and unstable wireless communication can impact the reliability of pervasive computing, making its application a more arduous task.
8. Usability. Pervasive computing means that smart and agile computing devices, though invisible, are embedded everywhere in the environment. Therefore, usability is the critical success factor for these applications, making this the hottest research topic in the field of pervasive computing. An easy-to-use and intuitive interface is the demand of the future [9]. Ease of use will follow different levels for different end users. Usability in pervasive computing applications is very important and requires more attention than all other areas, such as desktop and Web-based applications.
1.3 Technology
As noted in Section 1.1.1, pervasive computing involves state-of-the-art technology—such as a middleware and programming model, context-awareness computing, resource allocation and management, human–computer interaction (HCI), pervasive transaction processing, and data mining. We briefly discuss these aspects here.
1.3.1 Middleware
Pervasive applications often rely on some middleware support. This is not a coincidence. Application programmers face a large variety of challenges, such as data management, context management, security and privacy issues, and mobility. Solving these problems for each application is error prone and inefficient. Thus, it is more desirable to extract the common requirements from different applications and provide the desired functionality from a middleware layer, which hides the complexity and heterogeneity of underlying hardware and network platforms.
The pervasive middleware primarily addresses issues from high-level applications on one hand while dealing with the complexity of operating underlying devices, networks, and platforms on the other. High-level application requirements are often diverse and application specific, with the common themes being context awareness, locality, reliability, adaptability, and reusability.
The operations of pervasive middleware are realized by heterogeneous underlying devices, networks, and platforms. In practice, these operations are also constrained by physical resources, such as low computation capability and insufficient battery supply. As a result, the middleware must strike a balance between functionality provided for the application layer and the resource usage of underlying hardware devices. In different scenarios, one aspect of consideration can outweigh the other and can affect design decisions.
1.3.2 Context Awareness
Context refers to the pieces of information that capture the characteristics of pervasive computing environments [9,10]. We classify these into physical and virtual contexts based on context sources [11]. Physical contexts may be aggregated by physical sources, for example, sensing and computational devices such as handheld devices, wireless sensors, and Radio Frequency Identification (RFID), which involve accelerated speed, air pressure, light, location, movement, sound, touch, and temperature. Virtual contexts are specified by users or captured from user interactions—including user preferences, business processes, goals, and tasks.
Context awareness is a mechanism that assists pervasive applications in adapting their behaviors to the evolving contexts [12]. Suppose a call comes when Alice is watching Kung Fu Panda in her smart bedroom. Depending upon the urgency of the call and the caller’s relationship with Alice, this smart space adapts its behavior correspondingly (i.e., it will reject or accept the call). Most pervasive applications achieve context awareness in a similar fashion. They first acquire physical and virtual contexts and then exploit these contexts to determine what strategy should be taken when contexts keep evolving.
This book will cover the physical and virtual aspects through discussions of wireless sensor networking, user tracking, and context reasoning. Using wireless sensors is a basic, common, and effective way to gather physical contexts for pervasive applications. In a smart space, the architectural design of a wireless sensor network is a key challenge for achieving scalability, robustness, and balanced energy dissipation of the network. Location information is the most important context in pervasive computing. Accurate user tracking facilitates the provision of service in smart spaces. Based on context information, reasoning enables context awareness for pervasive applications. In this book, evidence theory, the Dempster–Shafer theory of context reasoning, evidence propagation, and evidence selection strategy will be discussed extensively.
1.3.3 Resource...

Índice