2
Most read
4
Most read
7
Most read
Pervasive Computing
What is pervasive computing?
Pervasive computing refers to embedding computers and
communication in our environment. The idea behind the
pervasive computing is to make the computing power disappear
in the environment, but will always be there whenever needed, it
means availability and invisibility. These invisible computers
won't have keyboards or screens, but will watch us, listen to us
and interact with us. Pervasive computing makes the computer
operate in the messy and unstructured world of real people and
real objects.
Pervasive Computing in short can be termed as
“Anything”, “Anytime", "Anywhere”
For example, a domestic pervasive computing
environment might interconnect lighting and
environmental controls with personal biometric
monitors woven into clothing so that illumination and
heating conditions in a room might be modulated
continuously.
HISTORY OF PERVASIVE COMPUTING
Pervasive computing is the third wave of computing
technologies to emerge since computers first appeared:
• First Wave - Mainframe computing era: one computer
shared by many people.
• Second Wave - Personal computing era: one computer
used by one person.
• Third Wave – Pervasive computing era: one person, many
computers. Millions of computers embedded in the
environment.
Four Principles of Pervasive Computing are:
– Decentralization
– Specialized services
– Connectivity
– Simplicity
Some Possible Applications:
Pervasive Computing involving Hybrid Internet works for:
Natural disaster-specific warning purposes like-
• Tsunami Warning
• Forest Fire Warning
• Volcanic Eruption Warning
• Flood Warning
Large-scale monitoring and tracking purposes like-
• Wildlife monitoring
• Baggage monitoring
• Intelligent Transportation Systems
• Wearable and Vehicular Computing
Advantages of Pervasive Computing:
 INVISIBLE: "Smart" environments will be embedded with computing
technologies that will be mostly out-of-sight.
 DECISION-MAKING: "Smart" environments will help occupants to make
choices about their everyday lives.
 INFORMATION PROCESSING: Architecture will go from crunching data to
making sense of data; therefore, eliminating our need to constantly input
adjustments.
 ENHANCING EXPERIENCE: As computers embed themselves in our
environments, sensors and actuators will create "smart" environments where
architectural space will be goal-oriented.
 CONVERGENCE: Much of our environment will be supplemented with
interconnected digital technologies. Such interconnectivity will allow for a new
type of "sharing" that will serve to eliminate many dull tasks.
Disadvantages of Pervasive Computing:
 Security issues
 Very expensive
 Slow and broken connections
Pervasive computing

More Related Content

PPTX
IOT - Design Principles of Connected Devices
PDF
Security in IoT
ODP
Ambient intelligence
PPTX
Pervasive Computing
ODP
UMTS, Introduction.
PPT
Cyber-Physical Systems
PPTX
Using prior knowledge to initialize the hypothesis,kbann
PPTX
IOT - Unit 3.pptx
IOT - Design Principles of Connected Devices
Security in IoT
Ambient intelligence
Pervasive Computing
UMTS, Introduction.
Cyber-Physical Systems
Using prior knowledge to initialize the hypothesis,kbann
IOT - Unit 3.pptx

What's hot (20)

PPTX
NIST Cloud Computing Reference Architecture.pptx
PPT
pervasive computing
PDF
Nb iot presentation
PDF
PERVASIVE COMPUTING
PPTX
Cloud security
PPTX
CYBER-PHYSICAL-SYSTEM.pptx
PPTX
Ambient intelligence
PPT
silent sound technology
PPTX
Edge Computing.pptx
PPT
PPT
Blue eye technology
PPTX
Wireless sensor network applications
PPT
Smart note-taker
PPTX
MANET in Mobile Computing
PPT
cloud computing:Types of virtualization
PPTX
Embedded system architecture.pptx
PDF
1. GRID COMPUTING
PPTX
IOT Unit-1 (Introduction to IOT) by Durgacharan
PPTX
Grid computing ppt
NIST Cloud Computing Reference Architecture.pptx
pervasive computing
Nb iot presentation
PERVASIVE COMPUTING
Cloud security
CYBER-PHYSICAL-SYSTEM.pptx
Ambient intelligence
silent sound technology
Edge Computing.pptx
Blue eye technology
Wireless sensor network applications
Smart note-taker
MANET in Mobile Computing
cloud computing:Types of virtualization
Embedded system architecture.pptx
1. GRID COMPUTING
IOT Unit-1 (Introduction to IOT) by Durgacharan
Grid computing ppt
Ad

Viewers also liked (8)

PPTX
Internal memory
PPTX
Computer assembler
PPTX
Process scheduling
PPTX
Virtual reality
PPTX
Key management and distribution
DOC
Project report-on-lakme
PDF
SlideShare 101
Internal memory
Computer assembler
Process scheduling
Virtual reality
Key management and distribution
Project report-on-lakme
SlideShare 101
Ad

Similar to Pervasive computing (20)

PPT
pervasive-computing-09022014092937-pervasive-computing.ppt
PPTX
Ubiquitous Computing
PPTX
Ubiquitous computing
PPTX
Ubiquitious computing -making computing accessible anywhere and anytime. .pptx
PPT
introduction of pervasive computing .ppt
PDF
Ubiquitous computing Paper
PPT
Introduction uc
PPTX
Ubiqutous Computing
PPT
Ubiquitous Computing
PPTX
Ubiquitous Computing: an Introduction
PPTX
UBIQUITOUS COMPUTING
PPT
Pervasive Computing
DOCX
Ubiquitous computing abstract
PPT
UBIQUITOUS COMPUTING - Mary M
PPT
Pervasivecomputing 140422034057-phpapp02
DOCX
Quality Metrics In Ubiquitous Computing
PPTX
Pervasive Computing
PPTX
Ubiquitous computing
PPT
cloud of things Presentation
PPTX
Ubiquitous computing-and-its-privacy
pervasive-computing-09022014092937-pervasive-computing.ppt
Ubiquitous Computing
Ubiquitous computing
Ubiquitious computing -making computing accessible anywhere and anytime. .pptx
introduction of pervasive computing .ppt
Ubiquitous computing Paper
Introduction uc
Ubiqutous Computing
Ubiquitous Computing
Ubiquitous Computing: an Introduction
UBIQUITOUS COMPUTING
Pervasive Computing
Ubiquitous computing abstract
UBIQUITOUS COMPUTING - Mary M
Pervasivecomputing 140422034057-phpapp02
Quality Metrics In Ubiquitous Computing
Pervasive Computing
Ubiquitous computing
cloud of things Presentation
Ubiquitous computing-and-its-privacy

Recently uploaded (20)

PPTX
Graph Data Structures with Types, Traversals, Connectivity, and Real-Life App...
PPTX
Chemical Technological Processes, Feasibility Study and Chemical Process Indu...
PDF
Design Guidelines and solutions for Plastics parts
PPTX
Information Storage and Retrieval Techniques Unit III
PDF
First part_B-Image Processing - 1 of 2).pdf
PDF
August -2025_Top10 Read_Articles_ijait.pdf
PDF
distributed database system" (DDBS) is often used to refer to both the distri...
PPTX
mechattonicsand iotwith sensor and actuator
PPTX
AUTOMOTIVE ENGINE MANAGEMENT (MECHATRONICS).pptx
PPTX
Management Information system : MIS-e-Business Systems.pptx
PPTX
wireless networks, mobile computing.pptx
PDF
Exploratory_Data_Analysis_Fundamentals.pdf
PDF
Computer organization and architecuture Digital Notes....pdf
PDF
LOW POWER CLASS AB SI POWER AMPLIFIER FOR WIRELESS MEDICAL SENSOR NETWORK
PPTX
Principal presentation for NAAC (1).pptx
PPTX
Sorting and Hashing in Data Structures with Algorithms, Techniques, Implement...
PDF
Accra-Kumasi Expressway - Prefeasibility Report Volume 1 of 7.11.2018.pdf
PDF
20250617 - IR - Global Guide for HR - 51 pages.pdf
PPTX
Module 8- Technological and Communication Skills.pptx
PDF
UEFA_Embodied_Carbon_Emissions_Football_Infrastructure.pdf
Graph Data Structures with Types, Traversals, Connectivity, and Real-Life App...
Chemical Technological Processes, Feasibility Study and Chemical Process Indu...
Design Guidelines and solutions for Plastics parts
Information Storage and Retrieval Techniques Unit III
First part_B-Image Processing - 1 of 2).pdf
August -2025_Top10 Read_Articles_ijait.pdf
distributed database system" (DDBS) is often used to refer to both the distri...
mechattonicsand iotwith sensor and actuator
AUTOMOTIVE ENGINE MANAGEMENT (MECHATRONICS).pptx
Management Information system : MIS-e-Business Systems.pptx
wireless networks, mobile computing.pptx
Exploratory_Data_Analysis_Fundamentals.pdf
Computer organization and architecuture Digital Notes....pdf
LOW POWER CLASS AB SI POWER AMPLIFIER FOR WIRELESS MEDICAL SENSOR NETWORK
Principal presentation for NAAC (1).pptx
Sorting and Hashing in Data Structures with Algorithms, Techniques, Implement...
Accra-Kumasi Expressway - Prefeasibility Report Volume 1 of 7.11.2018.pdf
20250617 - IR - Global Guide for HR - 51 pages.pdf
Module 8- Technological and Communication Skills.pptx
UEFA_Embodied_Carbon_Emissions_Football_Infrastructure.pdf

Pervasive computing

  • 2. What is pervasive computing? Pervasive computing refers to embedding computers and communication in our environment. The idea behind the pervasive computing is to make the computing power disappear in the environment, but will always be there whenever needed, it means availability and invisibility. These invisible computers won't have keyboards or screens, but will watch us, listen to us and interact with us. Pervasive computing makes the computer operate in the messy and unstructured world of real people and real objects.
  • 3. Pervasive Computing in short can be termed as “Anything”, “Anytime", "Anywhere” For example, a domestic pervasive computing environment might interconnect lighting and environmental controls with personal biometric monitors woven into clothing so that illumination and heating conditions in a room might be modulated continuously.
  • 4. HISTORY OF PERVASIVE COMPUTING Pervasive computing is the third wave of computing technologies to emerge since computers first appeared: • First Wave - Mainframe computing era: one computer shared by many people. • Second Wave - Personal computing era: one computer used by one person. • Third Wave – Pervasive computing era: one person, many computers. Millions of computers embedded in the environment.
  • 5. Four Principles of Pervasive Computing are: – Decentralization – Specialized services – Connectivity – Simplicity
  • 6. Some Possible Applications: Pervasive Computing involving Hybrid Internet works for: Natural disaster-specific warning purposes like- • Tsunami Warning • Forest Fire Warning • Volcanic Eruption Warning • Flood Warning Large-scale monitoring and tracking purposes like- • Wildlife monitoring • Baggage monitoring • Intelligent Transportation Systems • Wearable and Vehicular Computing
  • 7. Advantages of Pervasive Computing:  INVISIBLE: "Smart" environments will be embedded with computing technologies that will be mostly out-of-sight.  DECISION-MAKING: "Smart" environments will help occupants to make choices about their everyday lives.  INFORMATION PROCESSING: Architecture will go from crunching data to making sense of data; therefore, eliminating our need to constantly input adjustments.  ENHANCING EXPERIENCE: As computers embed themselves in our environments, sensors and actuators will create "smart" environments where architectural space will be goal-oriented.  CONVERGENCE: Much of our environment will be supplemented with interconnected digital technologies. Such interconnectivity will allow for a new type of "sharing" that will serve to eliminate many dull tasks.
  • 8. Disadvantages of Pervasive Computing:  Security issues  Very expensive  Slow and broken connections