Pervasive Computing


Abstract

Pervasive computing refers to embedding computers and communication in our environment. Pervasive computing provides an attractive vision for the future of computing. The idea behind the pervasive computing is to make the computing power disappear in the environment, but will always be there whenever needed or in other words it means availability and invisibility. These invisible computers won't have keyboards or screens, but will watch us, listen to us and interact with us.

Introduction

Pervasive computing environments involve the interaction, coordination, and cooperation of numerous, casually accessible, and often invisible computing devices. These devices will connect via wired and wireless links to one another as well as to the global networking infrastructure to provide more relevant information and integrated services. Existing approaches to building distributed applications, including client/server computing, are ill suited to meet this challenge.


Mobile computing and communication is one of the major parts of the pervasive computing system. Here data and computing resources are shared among the various devices. The coordination between these devices is maintained through communication, which may be wired or wireless. With the advent of Bluetooth and Ad hoc networking technologies the wireless communication has overtaken the wired counter part.

Implementation

There are many middleware technologies that provide a set of application programming interfaces (APIs) as well as network protocols that can meet the network requirements. It establishes a software platform enabling all devices that form the network to talk to each other, irrespective of their operating systems or interface constraints. In these environments, each device provides a service to other devices in the network. Each device publishes its own interfaces, which other devices can use to communicate with it and thereby access its particular service. This approach ensures compatibility and standardized access among all devices.

Adaptation

Adaptation is required in order to overcome the intrinsically dynamic nature of pervasive computing. Mobility of users, devices and software components can occur, leading to changes in the physical and virtual environments of these entities. Moreover, applications can be highly dynamic, with users requiring support for novel tasks and demanding the ability to change requirements on the fly.

Security Policy

A security policy is a set of rules for authorization, access control, and trust in a certain domain, it can also contain information about some users' roles and the abilities associated with those roles. Theft of service is the actual number one security problem in cellular networks. A similar problem exists with computer network services. Solutions devised for cellular telephony can be applied. Control of access to services relies on a form of identification. Either a user or a device may be identified.

HAVi- An Implementation in Consumer Appliance Environment

HAVi is a standard for home appliances consisting of a set of APIs, services, and a standard for communication. HAVi's primary goal is providing a dynamic service environment in which software components can discover and interact with other. It provides mechanisms for devices to discover, query and control other appliances on the home network, and provides system services such as message and event.

Conclusion

The trends in pervasive computing are increasing the diversity and heterogeneity of networks and their constituent devices Pervasive computing is expected to bring an explosion in the number of devices in our local environments. This paper presents a vision of a future computing landscape characterized by the ubiquity of computing devices, the autonomy, dynamicity and the heterogeneity of system components. 


No comments:

Post a Comment