Jini Supporting Ubiquitous and Pervasive Computing
نویسندگان
چکیده
The overall purpose of this article is partly to give a brief overview of the TangO conceptual model, partly to explore the Jini technology as a means for support of pervasive systems in general and the TangO conceptual model in particular, and to emphasize the advantages and weaknesses of the Jini technology for ubiquitous computing. We will validate our survey of the Jini Technology against the TangO model in general, and through an implementation of a Pervasive Shopping Mall
منابع مشابه
Results of Comparing Bandwidth Usage and Latency: Service Location Protocol and Jini
With resources such as printers, mail boxes or software available throughout the world and interconnected by fast networks, and with the increase in the number of mobile users, service discovery and pervasive computing are becoming important features of the network scenario. Service discovery is a essential element in the full deployment of pervasive computing. Service discovery allows devices ...
متن کاملProtocols for Service Discovery in Dynamic and Mobile Networks
Mobile and wireless computing is permeating the globe, affecting the way we live and conduct business using portable computers such as laptops, hand-held PCs, Palm computers, and even wearable computers. In becoming mobile, users innocently expect and demand the same computing luxury they used to (and still) enjoy in the fixed computing environment. Unfortunately, network resources (e.g. print...
متن کاملImproving Dependability of Service Oriented Architectures for Pervasive Computing
Service Oriented Programming which combines Distributed Object Compunting, Component Based and webbased concepts has recently emerged as a promising approach to develop dynamic and heterogeneous service provision environments. Such systems are referenced in literature as Service Oriented Architectures. Classic strategies to address dependability in Distributed Object Computing middlewares may n...
متن کاملA semantic-aware role-based access control model for pervasive computing environments
Access control in open and dynamic Pervasive Computing Environments (PCEs) is a very complex mechanism and encompasses various new requirements. In fact, in such environments, context information should be used in access control decision process; however, it is not applicable to gather all context information completely and accurately all the time. Thus, a suitable access control model for PCEs...
متن کامل