Pervasive Computing
eBook - ePub

Pervasive Computing

Concepts, Technologies and Applications

Minyi Guo, Jingyu Zhou, Feilong Tang, Yao Shen

Condividi libro
  1. 192 pagine
  2. English
  3. ePUB (disponibile sull'app)
  4. Disponibile su iOS e Android
eBook - ePub

Pervasive Computing

Concepts, Technologies and Applications

Minyi Guo, Jingyu Zhou, Feilong Tang, Yao Shen

Dettagli del libro
Anteprima del libro
Indice dei contenuti
Citazioni

Informazioni sul libro

This book introduces fundamental concepts and theories in pervasive computing as well as its key technologies and applications. It explains how to design and implement pervasive middleware and real application systems, covering nearly all aspects related to pervasive computing. Key technologies in the book include pervasive computing-oriented resource management and task migration, mobile pervasive transaction, human computer interface, and context collection-oriented wireless sensor networks.

Domande frequenti

Come faccio ad annullare l'abbonamento?
È semplicissimo: basta accedere alla sezione Account nelle Impostazioni e cliccare su "Annulla abbonamento". Dopo la cancellazione, l'abbonamento rimarrà attivo per il periodo rimanente già pagato. Per maggiori informazioni, clicca qui
È possibile scaricare libri? Se sì, come?
Al momento è possibile scaricare tramite l'app tutti i nostri libri ePub mobile-friendly. Anche la maggior parte dei nostri PDF è scaricabile e stiamo lavorando per rendere disponibile quanto prima il download di tutti gli altri file. Per maggiori informazioni, clicca qui
Che differenza c'è tra i piani?
Entrambi i piani ti danno accesso illimitato alla libreria e a tutte le funzionalità di Perlego. Le uniche differenze sono il prezzo e il periodo di abbonamento: con il piano annuale risparmierai circa il 30% rispetto a 12 rate con quello mensile.
Cos'è Perlego?
Perlego è un servizio di abbonamento a testi accademici, che ti permette di accedere a un'intera libreria online a un prezzo inferiore rispetto a quello che pagheresti per acquistare un singolo libro al mese. Con oltre 1 milione di testi suddivisi in più di 1.000 categorie, troverai sicuramente ciò che fa per te! Per maggiori informazioni, clicca qui.
Perlego supporta la sintesi vocale?
Cerca l'icona Sintesi vocale nel prossimo libro che leggerai per verificare se è possibile riprodurre l'audio. Questo strumento permette di leggere il testo a voce alta, evidenziandolo man mano che la lettura procede. Puoi aumentare o diminuire la velocità della sintesi vocale, oppure sospendere la riproduzione. Per maggiori informazioni, clicca qui.
Pervasive Computing è disponibile online in formato PDF/ePub?
Sì, puoi accedere a Pervasive Computing di Minyi Guo, Jingyu Zhou, Feilong Tang, Yao Shen in formato PDF e/o ePub, così come ad altri libri molto apprezzati nelle sezioni relative a Computer Science e Information Technology. Scopri oltre 1 milione di libri disponibili nel nostro catalogo.

Informazioni

Editore
CRC Press
Anno
2016
ISBN
9781315356457
Edizione
1
Chapter 1
Pervasive Computing Concepts
Since Mark Weiser first coined the phrase ubiquitous computing in 1988, when he was the chief technology officer at Xerox’s Palo Alto Research Center (PARC), the development of pervasive/ubiquitous computing has continued for more than quarter century. During this period, the popularization of mobile Internet devices such as smartphones and smart pads has led to the core perspective of pervasive computing (that of computing devices being available everywhere at any time) becoming the main trend in computing and information technology. As part of our daily lives, these devices help us connect to worldwide networks without boundaries and provide us with quick and secure access to a wealth of information and services.
This book aims to introduce a foundation of the concepts, architecture, key techniques, and typical applications of pervasive computing. The main body of this book focuses on context awareness, resource management, human–computer interface, pervasive transaction processing, and user preference discovery—all of which have been previously researched by our team.
1.1 Perspectives of Pervasive Computing
To help convey the look and feel of such a world, we present two hypothetical scenarios.
The first scenario involves a traveler. Dr. John is driving his car on a long distance trip. Along the way, the car detects when fuel will be used up, and it then automatically searches for gas stations nearby. In a short time, the car finds an appropriate location that can provide fuel at the lowest price among gas stations within 1 km. The pervasive device displays a suggestion to John and guides him to the selected gas station. Two hours later, it is lunch time and John is hungry. The pervasive devices search for an appropriate restaurant near John’s current location, according to his food preferences.
Our second scenario focuses on daily life. Professor Li is watching a video in his office using a personal computer (PC) when he receives a call asking him to attend a meeting. On his way there, John continues to watch the video using his smartphone. A pervasive computing system will recover the point in the video where John stopped watching it on his PC and will automatically download a low-resolution video to John’s smartphone (which has a low-resolution screen), connecting with the video server through a low-bandwidth wireless channel. In this case, the complex switch process is completely unnoticed by Professor Li.
From these scenarios, we observe that the whole is much greater than the sum of its parts. In other words, the real research takes place with the seamless integration of component technologies into a system such as iShadow [1].
1.1.1 Technology Trend Overview
The advancement of mobile computing, cloud computing, wearable computing, and smart devices has brought unprecedented opportunities for pervasive computing. In recent years, we have seen a sharp rise in the shipment of smartphones and smart pads. These mobile devices are equipped with multicore central processing units (CPUs), gigabytes of memory, Wi-Fi and cellular communication components, a global positioning system (GPS), and other sensors. As a result, in the not too distant future, they will have more powerful information storage and processing capabilities than desktop computers. In the meantime, millions of apps have been developed for these mobile devices that provide a wide variety of personalized services.
Previous pervasive computing was often limited by the physical size of the electronic devices. However, this constraint has been overcome by rapid technological developments. A variety of wearable devices have entered the mass market, such as Google Glass, Jawbone UP [2], Nike FuelBand [3], and Sony SmartWatch [4]. These wearable devices have successfully extended computation, storage, and communication capabilities to personal gadgets, providing a unique opportunity for expanding the sensing capabilities of users and offering situation-aware information. For instance, a user with a Google Glass may visualize the transit route of nearby metro stations within the device’s screen.
Additionally, many traditional appliances are now embedded with sensors and communication components, thus making them smarter. For instance, the Smart Sofa [5] can identify the people sitting on it using programmable sensors in the sofa legs and can address users with personalized greetings.
1.1.2 Pervasive Computing: Concepts
Pervasive computing is a new wave of technology where computing takes place everywhere and anywhere. The goal of pervasive computing is to become a technology that disappears [6]. Pervasive computing can be seen as an enabler technology for many new and exciting applications, making information accessible to anyone, anywhere, and at any time [7].
Pervasive computing saw rapid growth in the past few decades due to a shift from a technology perspective to a utility and usability perspective. Pervasive computing, although currently used in today’s fast-paced lifestyle, will also be the future of this transition [8].
Pervasive computing projects have emerged at major universities and in industry. For example, Carnegie Mellon University, the University of California at Berkeley (UC Berkeley), Massachusetts Institute of Technology (MIT), and the University of Washington set up the Aura, Endeavour, Oxygen, and Portolano projects, respectively. These represent a broad communal effort to make pervasive computing a reality, focusing on technology that is more social and more people oriented [6].
1.2 Challenges
Although pervasive computing offers a lot of new, interesting, and useful possibilities, many challenges need to be overcome before the vision becomes real. The main challenges faced in pervasive computing are as follows [6]:
1. Transparency. Pervasive computing is people-oriented, providing transparent services based on individual requirements, preferences, and so on. In contrast to desktop computing, pervasive computing can use any device, in any location, and in any format, without an individual being consciously aware of what is taking place with respect to the actual computing.
2. Context awareness. Typically, pervasive computing systems are very tightly connected with specific users. Pervasive computing systems often gather and store information on the user’s behavior, context, habits, and planning. This information forms the basis for the many benefits the system can offer individual users.
3. Mobility. The omnipresence of ubiquitous applications typically is achieved by either having devices move with the user or by having applications move among mobile users’ devices. In both cases, applications need to adapt to the moving environment, which involves maintaining device connections and adapting protocol for handling mobility. Although some of the problems can be addressed by routing and handovers, many cannot be solved at the network level because knowledge of application semantics is required for runtime adaptation.
4. Heterogeneous devices. Pervasive applications typically involve many different types of devices working in an orchestrated way. As a user moves around in an environment, the servicing application often moves with him. For instance, the application may switch from a desktop PC to a mobile phone. In addition, the heterogeneous devices complicate the development of high-level applications because different devices provide varied programming interfaces, resource abstractions, and functional capabilities.
5. Data management. In a pervasive environment, many devices continuously produce huge amounts of raw data. It is challenging to transfer, store, and process these data. In order to provide meaningful semantics for high-level applications, some preprocessing of the data may be necessary. For instance, inaccurate data can cause context management systems to produce false context information, which can result in incorrect reasoning for applications.
6. Fault tolerance. The pervasive application requires harmonious cooperation among many hardware devices and various software components. However, hardware devices such as sensors are prone to failures, and software components can often malfunction. Both types of failures can hamper the effectiveness of pervasive applications. Thus, fault tolerance measures must be built into the system to avoid serious or fatal consequences for users.
7. Reliability. Pervasive computing systems normally are embedded in the environment not only for gathering information but also for making decisions or at least for decision support. Limited resources and unstable wireless communication can impact the reliability of pervasive computing, making its application a more arduous task.
8. Usability. Pervasive computing means that smart and agile computing devices, though invisible, are embedded everywhere in the environment. Therefore, usability is the critical success factor for these applications, making this the hottest research topic in the field of pervasive computing. An easy-to-use and intuitive interface is the demand of the future [9]. Ease of use will follow different levels for different end users. Usability in pervasive computing applications is very important and requires more attention than all other areas, such as desktop and Web-based applications.
1.3 Technology
As noted in Section 1.1.1, pervasive computing involves state-of-the-art technology—such as a middleware and programming model, context-awareness computing, resource allocation and management, human–computer interaction (HCI), pervasive transaction processing, and data mining. We briefly discuss these aspects here.
1.3.1 Middleware
Pervasive applications often rely on some middleware support. This is not a coincidence. Application programmers face a large variety of challenges, such as data management, context management, security and privacy issues, and mobility. Solving these problems for each application is error prone and inefficient. Thus, it is more desirable to extract the common requirements from different applications and provide the desired functionality from a middleware layer, which hides the complexity and heterogeneity of underlying hardware and network platforms.
The pervasive middleware primarily addresses issues from high-level applications on one hand while dealing with the complexity of operating underlying devices, networks, and platforms on the other. High-level application requirements are often diverse and application specific, with the common themes being context awareness, locality, reliability, adaptability, and reusability.
The operations of pervasive middleware are realized by heterogeneous underlying devices, networks, and platforms. In practice, these operations are also constrained by physical resources, such as low computation capability and insufficient battery supply. As a result, the middleware must strike a balance between functionality provided for the application layer and the resource usage of underlying hardware devices. In different scenarios, one aspect of consideration can outweigh the other and can affect design decisions.
1.3.2 Context Awareness
Context refers to the pieces of information that capture the characteristics of pervasive computing environments [9,10]. We classify these into physical and virtual contexts based on context sources [11]. Physical contexts may be aggregated by physical sources, for example, sensing and computational devices such as handheld devices, wireless sensors, and Radio Frequency Identification (RFID), which involve accelerated speed, air pressure, light, location, movement, sound, touch, and temperature. Virtual contexts are specified by users or captured from user interactions—including user preferences, business processes, goals, and tasks.
Context awareness is a mechanism that assists pervasive applications in adapting their behaviors to the evolving contexts [12]. Suppose a call comes when Alice is watching Kung Fu Panda in her smart bedroom. Depending upon the urgency of the call and the caller’s relationship with Alice, this smart space adapts its behavior correspondingly (i.e., it will reject or accept the call). Most pervasive applications achieve context awareness in a similar fashion. They first acquire physical and virtual contexts and then exploit these contexts to determine what strategy should be taken when contexts keep evolving.
This book will cover the physical and virtual aspects through discussions of wireless sensor networking, user tracking, and context reasoning. Using wireless sensors is a basic, common, and effective way to gather physical contexts for pervasive applications. In a smart space, the architectural design of a wireless sensor network is a key challenge for achieving scalability, robustness, and balanced energy dissipation of the network. Location information is the most important context in pervasive computing. Accurate user tracking facilitates the provision of service in smart spaces. Based on context information, reasoning enables context awareness for pervasive applications. In this book, evidence theory, the Dempster–Shafer theory of context reasoning, evidence propagation, and evidence selection strategy will be discussed extensively.
1.3.3 Resource...

Indice dei contenuti