SlideShare uma empresa Scribd logo
1 de 13
Ali Bahu
03/24/2013
PERVASIVE
COMPUTING
INTRODUCTION
 An environment in which people interact with embedded (and
mostly invisible) computers (processors) and in which networked
devices are aware of their surroundings and peers and are able to
provide services or use services from peers effectively. It is the
ability to access information and software applications anytime
and anywhere. It is also Known as:
 Pervasive Computing
 Ubiquitous Computing
 Ambient Intelligence
 Wearable Computing
 Context Awareness
TODAY:
Cool toys…
OUR WORLD TODAY:
 Devices increasingly more
powerful.
 Devices are also becoming
smaller & cheaper.
 People interact daily with
hundreds of computing devices
(many of them mobile):
 Cars
 Desktops/Laptops
 Cell phones
 PDAs
 MP3 players
 Transportation passes, etc.
JUST NOW…
Too bad they
can’t talk to
each other…
TODAY…
Configuration?
Too much work…
GOALS OF PERVASIVE
COMPUTING
 As our lives are full of devices and gadgets with different
functionalities and abilities, it is becoming harder to keep track of
each one of them and use them efficiently and seamlessly. This is
where the pervasive computing come is into the picture with the
following goals:
 Invisible technology
 Integration of virtual and physical worlds
 Throughout desks, rooms, buildings, and life
 Take the data out of environment, leaving behind just an enhanced ability to act.
 Devices and services communicating with each other without any human
intervention or help.
PERVASIVE COMPUTING
APPLICATIONS
 Always running and available.
 Composed of collaborating parts spared over the network –
distributed components.
 Adapt to environments when the users/devices move –
reconfigure to use available services.
 Users are not aware of the computing embedded in the device –
transparent interaction.
 Information pursues the user rather than user pursues the
information.
SERVICE DISCOVERY
 Goal – allow devices to advertise, discover, configure, and
communicate with each other in a mobile network
 Example – when a device is moving between networks, it needs to
know what services are still available, will be available, and no longer
available. It also needs to know how to contact to these services.
Then, based on the resources, the device is able to perform its task and
for that Service Discovery Protocols are used.
 Service Discovery Protocols – protocol to facilitate association of
devices that have services to offer or that need services
 Enable interoperability
 Communication between devices
 Accommodate heterogeneity
 Devices can be of different kind
 Minimize administrative overhead
 Increase usability
 Simplified design time implementation
SERVICE LOCATION PROTOCOL
 A service discovery protocol for advertisement and discovery of network
services.
 Each service has a service type, which defines a collection of services
with a common nature.
 Each service has a name and a list of characteristics where each
characteristic is defined by a attribute-value pairing and Service with the
same service type have similar attributes but different values.
 For a device to connect to a service, a Service Access Point (SAP) is
needed which contains information about where and how to get the
service and secondly the structure of SAP is defined by URLs of
scheme service.
CONT.
 For the device to know if a service is what it needs, a Service
Advertisement is needed which contains information describing a
service including Service Type, the values of the attributes, and the
Service Access Point.
 Each device can be defined as an User Agent (UA) or a Service Agent
(SA) where User Agents are consumers of service and Service Agents
are providers of service.
 (Optionally) there is also a Directory Agent (DA) that maintains service
advertisements
 Many other service discovery protocols are available for example
Jini, Bluetooth, UPnP, Salutation, etc.
 The protocols are usually compose of the service clients (UA), service
providers (SA), and service directories (DA)
SERVICE DISCOVERY
PROTOCOLS
CHALLENGES
 Invisibility – disappearance of computing technology from users'
consciousness; embedding/combining computing infrastructure with
building infrastructure
 Scalability – scalability of users, devices, density of interactions in a
local area
 Availability – access to software applications and information anytime
and anywhere
 Dynamic – users and devices are mobile, services are provided by
collaborating distributed components
 Heterogeneity – variety of hardware, software platforms, network
protocols, service providers
 Integration with people – personal privacy, user intentions, access
control

Mais conteúdo relacionado

Mais procurados (18)

Definition of cloud computing
Definition of cloud computingDefinition of cloud computing
Definition of cloud computing
 
A short discussion on cloud computing
A short discussion on cloud computingA short discussion on cloud computing
A short discussion on cloud computing
 
Characteristics of cloud computing
Characteristics of cloud computingCharacteristics of cloud computing
Characteristics of cloud computing
 
cloud-computing
cloud-computingcloud-computing
cloud-computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
When revenue intelligence meets the cloud
When revenue intelligence meets the cloudWhen revenue intelligence meets the cloud
When revenue intelligence meets the cloud
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Social Cloud: Cloud Computing in Social Networks
Social Cloud: Cloud Computing in Social NetworksSocial Cloud: Cloud Computing in Social Networks
Social Cloud: Cloud Computing in Social Networks
 
Cloud Ecosystem
Cloud EcosystemCloud Ecosystem
Cloud Ecosystem
 
Cloud comouting
Cloud comoutingCloud comouting
Cloud comouting
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
2.evaluating cloud platforms
2.evaluating cloud platforms2.evaluating cloud platforms
2.evaluating cloud platforms
 
Cloud
CloudCloud
Cloud
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
What is hybrid cloud computing
What is hybrid cloud computingWhat is hybrid cloud computing
What is hybrid cloud computing
 
cloud computing tutorial
cloud computing tutorialcloud computing tutorial
cloud computing tutorial
 
Cloud interoperability
Cloud interoperabilityCloud interoperability
Cloud interoperability
 
Cloud computing ravi namboori
Cloud computing ravi nambooriCloud computing ravi namboori
Cloud computing ravi namboori
 

Destaque

EclipseMAT
EclipseMATEclipseMAT
EclipseMATAli Bahu
 
EMMS 2015: De la superación a la super-acción
EMMS 2015: De la superación a la super-acciónEMMS 2015: De la superación a la super-acción
EMMS 2015: De la superación a la super-acciónFromDoppler
 
Doppler Academy: Cómo convertir seguidores y fans en clientes
Doppler Academy: Cómo convertir seguidores y fans en clientesDoppler Academy: Cómo convertir seguidores y fans en clientes
Doppler Academy: Cómo convertir seguidores y fans en clientesFromDoppler
 
Pocognoni disagio oculare ii meeting marchigiano
Pocognoni disagio oculare ii meeting marchigianoPocognoni disagio oculare ii meeting marchigiano
Pocognoni disagio oculare ii meeting marchigianoRudycantfail
 
Top 5 Java Performance Metrics, Tips & Tricks
Top 5 Java Performance Metrics, Tips & TricksTop 5 Java Performance Metrics, Tips & Tricks
Top 5 Java Performance Metrics, Tips & TricksAppDynamics
 
Apache Ant
Apache AntApache Ant
Apache AntAli Bahu
 
Apache Ant
Apache AntApache Ant
Apache AntAli Bahu
 
Despacho Prestação de Contas Campanha Dilma
Despacho Prestação de Contas Campanha DilmaDespacho Prestação de Contas Campanha Dilma
Despacho Prestação de Contas Campanha DilmaSalomão Pamplona
 
Company website presentation final april 2016
Company website presentation final   april 2016Company website presentation final   april 2016
Company website presentation final april 2016AnteroResources
 
Projecte interdisciplinari definitiu
Projecte interdisciplinari definitiuProjecte interdisciplinari definitiu
Projecte interdisciplinari definitiumariscotbasimma
 
Tecnologías de la información y la comunicación
Tecnologías de la información y la comunicaciónTecnologías de la información y la comunicación
Tecnologías de la información y la comunicaciónsoda16
 
INSTRUCTIVO PARA LA PRESENTACIÓN DE CARPETAS DE ANTECEDENTES CONCURSO DE ASPI...
INSTRUCTIVO PARA LA PRESENTACIÓN DE CARPETAS DE ANTECEDENTES CONCURSO DE ASPI...INSTRUCTIVO PARA LA PRESENTACIÓN DE CARPETAS DE ANTECEDENTES CONCURSO DE ASPI...
INSTRUCTIVO PARA LA PRESENTACIÓN DE CARPETAS DE ANTECEDENTES CONCURSO DE ASPI...helidiseno
 
Primer intento tecnología de la información
Primer intento tecnología de la informaciónPrimer intento tecnología de la información
Primer intento tecnología de la informacióntecnologia_vanessa
 

Destaque (20)

Jhiccup
JhiccupJhiccup
Jhiccup
 
EclipseMAT
EclipseMATEclipseMAT
EclipseMAT
 
EMMS 2015: De la superación a la super-acción
EMMS 2015: De la superación a la super-acciónEMMS 2015: De la superación a la super-acción
EMMS 2015: De la superación a la super-acción
 
Hawianholdings
HawianholdingsHawianholdings
Hawianholdings
 
Doppler Academy: Cómo convertir seguidores y fans en clientes
Doppler Academy: Cómo convertir seguidores y fans en clientesDoppler Academy: Cómo convertir seguidores y fans en clientes
Doppler Academy: Cómo convertir seguidores y fans en clientes
 
Cartelismo Francés
Cartelismo FrancésCartelismo Francés
Cartelismo Francés
 
Pocognoni disagio oculare ii meeting marchigiano
Pocognoni disagio oculare ii meeting marchigianoPocognoni disagio oculare ii meeting marchigiano
Pocognoni disagio oculare ii meeting marchigiano
 
Hadoop
HadoopHadoop
Hadoop
 
Top 5 Java Performance Metrics, Tips & Tricks
Top 5 Java Performance Metrics, Tips & TricksTop 5 Java Performance Metrics, Tips & Tricks
Top 5 Java Performance Metrics, Tips & Tricks
 
Apache Ant
Apache AntApache Ant
Apache Ant
 
Apache Ant
Apache AntApache Ant
Apache Ant
 
Despacho Prestação de Contas Campanha Dilma
Despacho Prestação de Contas Campanha DilmaDespacho Prestação de Contas Campanha Dilma
Despacho Prestação de Contas Campanha Dilma
 
Company website presentation final april 2016
Company website presentation final   april 2016Company website presentation final   april 2016
Company website presentation final april 2016
 
Projecte interdisciplinari definitiu
Projecte interdisciplinari definitiuProjecte interdisciplinari definitiu
Projecte interdisciplinari definitiu
 
Tecnologías de la información y la comunicación
Tecnologías de la información y la comunicaciónTecnologías de la información y la comunicación
Tecnologías de la información y la comunicación
 
INSTRUCTIVO PARA LA PRESENTACIÓN DE CARPETAS DE ANTECEDENTES CONCURSO DE ASPI...
INSTRUCTIVO PARA LA PRESENTACIÓN DE CARPETAS DE ANTECEDENTES CONCURSO DE ASPI...INSTRUCTIVO PARA LA PRESENTACIÓN DE CARPETAS DE ANTECEDENTES CONCURSO DE ASPI...
INSTRUCTIVO PARA LA PRESENTACIÓN DE CARPETAS DE ANTECEDENTES CONCURSO DE ASPI...
 
Thava
ThavaThava
Thava
 
Ctdl 1999
Ctdl   1999Ctdl   1999
Ctdl 1999
 
Primer intento tecnología de la información
Primer intento tecnología de la informaciónPrimer intento tecnología de la información
Primer intento tecnología de la información
 
TICVEGADEO
TICVEGADEOTICVEGADEO
TICVEGADEO
 

Semelhante a Pervasive Computing Introduction and Service Discovery Protocols

Multiple user interfaces and crossplatform
Multiple user interfaces and crossplatformMultiple user interfaces and crossplatform
Multiple user interfaces and crossplatformcsandit
 
A survey of service Discovery Architecture of MANET with AODV-SD
A survey of service Discovery Architecture of MANET with AODV-SDA survey of service Discovery Architecture of MANET with AODV-SD
A survey of service Discovery Architecture of MANET with AODV-SDEditor IJCATR
 
Cse rover-technology-report
Cse rover-technology-reportCse rover-technology-report
Cse rover-technology-reportnagxenapp
 
IRJET- Pervasive Computing Service Discovery in Secure Framework Environment
IRJET- Pervasive Computing Service Discovery in Secure Framework EnvironmentIRJET- Pervasive Computing Service Discovery in Secure Framework Environment
IRJET- Pervasive Computing Service Discovery in Secure Framework EnvironmentIRJET Journal
 
A Converged Approach to Standards for Industrial Automation
A Converged Approach to Standards for Industrial AutomationA Converged Approach to Standards for Industrial Automation
A Converged Approach to Standards for Industrial AutomationGerardo Pardo-Castellote
 
e-suap cloud computing- English version
e-suap cloud computing- English versione-suap cloud computing- English version
e-suap cloud computing- English versionSabino Labarile
 
D sys ch-vvdp-unit-1
D sys ch-vvdp-unit-1D sys ch-vvdp-unit-1
D sys ch-vvdp-unit-1shaik subhani
 
A Study Mobile Computing
A Study   Mobile ComputingA Study   Mobile Computing
A Study Mobile ComputingSara Alvarez
 
Onubha brochure
Onubha brochureOnubha brochure
Onubha brochureOlsen Song
 
Middleware.pptx
Middleware.pptxMiddleware.pptx
Middleware.pptxyudragispi
 
Pervasive computing
Pervasive computingPervasive computing
Pervasive computingPallav Kumar
 
Quality Metrics In Ubiquitous Computing
Quality Metrics In Ubiquitous ComputingQuality Metrics In Ubiquitous Computing
Quality Metrics In Ubiquitous ComputingRutvik Pensionwar
 
Live Matches , Streaming , Scores
Live Matches , Streaming , ScoresLive Matches , Streaming , Scores
Live Matches , Streaming , Scoreswebcric .site
 
Mobile technology-Unit 1
Mobile technology-Unit 1Mobile technology-Unit 1
Mobile technology-Unit 1Swapnali Pawar
 
Ambiences on the-fly usage of available resources through personal devices
Ambiences  on the-fly usage of available resources through personal devicesAmbiences  on the-fly usage of available resources through personal devices
Ambiences on the-fly usage of available resources through personal devicesijasuc
 
Mobile agents in a distributed multimedia dabase system(synopsis)
Mobile agents in a distributed multimedia dabase system(synopsis)Mobile agents in a distributed multimedia dabase system(synopsis)
Mobile agents in a distributed multimedia dabase system(synopsis)Mumbai Academisc
 
A scalable server architecture for mobile presence services in social network...
A scalable server architecture for mobile presence services in social network...A scalable server architecture for mobile presence services in social network...
A scalable server architecture for mobile presence services in social network...IEEEFINALYEARPROJECTS
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT A scalable server architecture for m...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT A scalable server architecture for m...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT A scalable server architecture for m...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT A scalable server architecture for m...IEEEGLOBALSOFTTECHNOLOGIES
 

Semelhante a Pervasive Computing Introduction and Service Discovery Protocols (20)

Multiple user interfaces and crossplatform
Multiple user interfaces and crossplatformMultiple user interfaces and crossplatform
Multiple user interfaces and crossplatform
 
A survey of service Discovery Architecture of MANET with AODV-SD
A survey of service Discovery Architecture of MANET with AODV-SDA survey of service Discovery Architecture of MANET with AODV-SD
A survey of service Discovery Architecture of MANET with AODV-SD
 
Distributed computing
Distributed computingDistributed computing
Distributed computing
 
Cse rover-technology-report
Cse rover-technology-reportCse rover-technology-report
Cse rover-technology-report
 
IRJET- Pervasive Computing Service Discovery in Secure Framework Environment
IRJET- Pervasive Computing Service Discovery in Secure Framework EnvironmentIRJET- Pervasive Computing Service Discovery in Secure Framework Environment
IRJET- Pervasive Computing Service Discovery in Secure Framework Environment
 
A Converged Approach to Standards for Industrial Automation
A Converged Approach to Standards for Industrial AutomationA Converged Approach to Standards for Industrial Automation
A Converged Approach to Standards for Industrial Automation
 
e-suap cloud computing- English version
e-suap cloud computing- English versione-suap cloud computing- English version
e-suap cloud computing- English version
 
D sys ch-vvdp-unit-1
D sys ch-vvdp-unit-1D sys ch-vvdp-unit-1
D sys ch-vvdp-unit-1
 
A Study Mobile Computing
A Study   Mobile ComputingA Study   Mobile Computing
A Study Mobile Computing
 
Mobile Technology
Mobile TechnologyMobile Technology
Mobile Technology
 
Onubha brochure
Onubha brochureOnubha brochure
Onubha brochure
 
Middleware.pptx
Middleware.pptxMiddleware.pptx
Middleware.pptx
 
Pervasive computing
Pervasive computingPervasive computing
Pervasive computing
 
Quality Metrics In Ubiquitous Computing
Quality Metrics In Ubiquitous ComputingQuality Metrics In Ubiquitous Computing
Quality Metrics In Ubiquitous Computing
 
Live Matches , Streaming , Scores
Live Matches , Streaming , ScoresLive Matches , Streaming , Scores
Live Matches , Streaming , Scores
 
Mobile technology-Unit 1
Mobile technology-Unit 1Mobile technology-Unit 1
Mobile technology-Unit 1
 
Ambiences on the-fly usage of available resources through personal devices
Ambiences  on the-fly usage of available resources through personal devicesAmbiences  on the-fly usage of available resources through personal devices
Ambiences on the-fly usage of available resources through personal devices
 
Mobile agents in a distributed multimedia dabase system(synopsis)
Mobile agents in a distributed multimedia dabase system(synopsis)Mobile agents in a distributed multimedia dabase system(synopsis)
Mobile agents in a distributed multimedia dabase system(synopsis)
 
A scalable server architecture for mobile presence services in social network...
A scalable server architecture for mobile presence services in social network...A scalable server architecture for mobile presence services in social network...
A scalable server architecture for mobile presence services in social network...
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT A scalable server architecture for m...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT A scalable server architecture for m...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT A scalable server architecture for m...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT A scalable server architecture for m...
 

Último

TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integrationmarketing932765
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 

Último (20)

TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 

Pervasive Computing Introduction and Service Discovery Protocols

  • 2. INTRODUCTION  An environment in which people interact with embedded (and mostly invisible) computers (processors) and in which networked devices are aware of their surroundings and peers and are able to provide services or use services from peers effectively. It is the ability to access information and software applications anytime and anywhere. It is also Known as:  Pervasive Computing  Ubiquitous Computing  Ambient Intelligence  Wearable Computing  Context Awareness
  • 4. OUR WORLD TODAY:  Devices increasingly more powerful.  Devices are also becoming smaller & cheaper.  People interact daily with hundreds of computing devices (many of them mobile):  Cars  Desktops/Laptops  Cell phones  PDAs  MP3 players  Transportation passes, etc.
  • 5. JUST NOW… Too bad they can’t talk to each other…
  • 7. GOALS OF PERVASIVE COMPUTING  As our lives are full of devices and gadgets with different functionalities and abilities, it is becoming harder to keep track of each one of them and use them efficiently and seamlessly. This is where the pervasive computing come is into the picture with the following goals:  Invisible technology  Integration of virtual and physical worlds  Throughout desks, rooms, buildings, and life  Take the data out of environment, leaving behind just an enhanced ability to act.  Devices and services communicating with each other without any human intervention or help.
  • 8. PERVASIVE COMPUTING APPLICATIONS  Always running and available.  Composed of collaborating parts spared over the network – distributed components.  Adapt to environments when the users/devices move – reconfigure to use available services.  Users are not aware of the computing embedded in the device – transparent interaction.  Information pursues the user rather than user pursues the information.
  • 9. SERVICE DISCOVERY  Goal – allow devices to advertise, discover, configure, and communicate with each other in a mobile network  Example – when a device is moving between networks, it needs to know what services are still available, will be available, and no longer available. It also needs to know how to contact to these services. Then, based on the resources, the device is able to perform its task and for that Service Discovery Protocols are used.  Service Discovery Protocols – protocol to facilitate association of devices that have services to offer or that need services  Enable interoperability  Communication between devices  Accommodate heterogeneity  Devices can be of different kind  Minimize administrative overhead  Increase usability  Simplified design time implementation
  • 10. SERVICE LOCATION PROTOCOL  A service discovery protocol for advertisement and discovery of network services.  Each service has a service type, which defines a collection of services with a common nature.  Each service has a name and a list of characteristics where each characteristic is defined by a attribute-value pairing and Service with the same service type have similar attributes but different values.  For a device to connect to a service, a Service Access Point (SAP) is needed which contains information about where and how to get the service and secondly the structure of SAP is defined by URLs of scheme service.
  • 11. CONT.  For the device to know if a service is what it needs, a Service Advertisement is needed which contains information describing a service including Service Type, the values of the attributes, and the Service Access Point.  Each device can be defined as an User Agent (UA) or a Service Agent (SA) where User Agents are consumers of service and Service Agents are providers of service.  (Optionally) there is also a Directory Agent (DA) that maintains service advertisements  Many other service discovery protocols are available for example Jini, Bluetooth, UPnP, Salutation, etc.  The protocols are usually compose of the service clients (UA), service providers (SA), and service directories (DA)
  • 13. CHALLENGES  Invisibility – disappearance of computing technology from users' consciousness; embedding/combining computing infrastructure with building infrastructure  Scalability – scalability of users, devices, density of interactions in a local area  Availability – access to software applications and information anytime and anywhere  Dynamic – users and devices are mobile, services are provided by collaborating distributed components  Heterogeneity – variety of hardware, software platforms, network protocols, service providers  Integration with people – personal privacy, user intentions, access control