Abstract
Pervasive computing
refers to embedding computers and communication in our environment. Pervasive
computing provides an attractive vision for the future of computing. The idea
behind the pervasive computing is to make the computing power disappear in the
environment, but will always be there whenever needed or in other words it
means availability and invisibility. These invisible computers won't have
keyboards or screens, but will watch us, listen to us and interact with us.
Introduction
Pervasive computing
environments involve the interaction, coordination, and cooperation of
numerous, casually accessible, and often invisible computing devices. These
devices will connect via wired and wireless links to one another as well as to
the global networking infrastructure to provide more relevant information and
integrated services. Existing approaches to building distributed applications,
including client/server computing, are ill suited to meet this challenge.
Mobile computing and
communication is one of the major parts of the pervasive computing system. Here
data and computing resources are shared among the various devices. The
coordination between these devices is maintained through communication, which
may be wired or wireless. With the advent of Bluetooth and Ad hoc networking
technologies the wireless communication has overtaken the wired counter part.
Implementation
There are many
middleware technologies that provide a set of application programming
interfaces (APIs) as well as network protocols that can meet the network
requirements. It establishes a software platform enabling all devices that form
the network to talk to each other, irrespective of their operating systems or
interface constraints. In these environments, each device provides a service to
other devices in the network. Each device publishes its own interfaces, which
other devices can use to communicate with it and thereby access its particular
service. This approach ensures compatibility and standardized access among all
devices.
Adaptation
Adaptation is required
in order to overcome the intrinsically dynamic nature of pervasive computing.
Mobility of users, devices and software components can occur, leading to
changes in the physical and virtual environments of these entities. Moreover,
applications can be highly dynamic, with users requiring support for novel
tasks and demanding the ability to change requirements on the fly.
Security Policy
A security policy is a
set of rules for authorization, access control, and trust in a certain domain,
it can also contain information about some users' roles and the abilities
associated with those roles. Theft of service is the actual number one security
problem in cellular networks. A similar problem exists with computer network
services. Solutions devised for cellular telephony can be applied. Control of
access to services relies on a form of identification. Either a user or a
device may be identified.
HAVi- An Implementation in Consumer Appliance Environment
HAVi is a standard for
home appliances consisting of a set of APIs, services, and a standard for
communication. HAVi's primary goal is providing a dynamic service environment
in which software components can discover and interact with other. It provides
mechanisms for devices to discover, query and control other appliances on the home
network, and provides system services such as message and event.
Conclusion
The trends in pervasive
computing are increasing the diversity and heterogeneity of networks and their
constituent devices Pervasive computing is expected to bring an explosion in
the number of devices in our local environments. This paper presents a vision
of a future computing landscape characterized by the ubiquity of computing
devices, the autonomy, dynamicity and the heterogeneity of system components.
No comments:
Post a Comment