Beruflich Dokumente
Kultur Dokumente
ID: ms150200232
MSCS: 2nd Semester
Remote communication
Fault tolerance
Remote information access
Distributed security encryption (mutual authentication)
Mobile networking
Mobile information access
Adaptive applications
Energy-aware systems
Masking Uneven Conditions
Location sensitivity
Authentication
Security
Switching process
Scalability
Linking
1) Security:
Security includes encryption-based mutual authentication and privacy. Privacy is already a
thorny problem in pervasive computing. Mechanisms such as location tracking, smart spaces,
and use of surrogates monitor user actions on an almost continuous basis. As a user becomes
more dependent on a pervasive computing system, it becomes more knowledgeable about that
users movements, behavior patterns and habits. Exploiting this information is critical to
successful pro-activity and self-tuning.
2) Authentication:
It is also a problem of pervasive computing. Mutual Authentication is a security feature in which
a client process must prove its identity to a server, and the server must prove its identity to the
client, before any application traffic is sent over the client-to-server connection.
3) Scalability:
Like the inverse square laws of nature, good system design has to achieve scalability by severely
reducing interactions between distant entities.
Another problem of pervasive computing is localized scalability. As smart space growing in
sophistication, the intensity of interactions between userss personal computing space and his
surroundings increases. This has severe bandwidth, energy and distraction implications for a
wireless mobile user. The presence of multiple users will further complicate this problem.
Scalability, in the broadest sense, is thus a critical problem in pervasive computing.
4) Masking Uneven Conditions:
Another problem in pervasive computing is the development of techniques for masking uneven
conditioning of environments. The rate of penetration of pervasive computing technology into
the infrastructure will vary considerably depending on many non-technical factors such as
organizational structure, economics and business models.
5) Invisibility:
The second thrust is invisibility. The ideal expressed by Weiser is complete disappearance of
pervasive computing technology from a users consciousness. There exits huge differences in the
smartness of different environments. The large dynamic range of smartness can be jarring to
a user, detracting from the goal of making pervasive computing technology invisible. Because of
differences in these capabilities from one device to another, the view component of an
application will have to be rewritten for each device.
6) Linking:
The link between what is measured in real world and what is deduced about the real world from
that measurement might be incorrect. These application execute in a dynamic environment that
supports multiple levels of connectivity so it is matter of worry about dynamically varying the
partitioning of the application between the various connectivity scenarios.
It is very much more difficult to design and implement a pervasive computing system than a
simple distributed system of comparable robustness and maturity.