We use cookies to give you the best experience possible. By continuing we’ll assume you’re on board with our cookie policy

See Pricing

What's Your Topic?

Hire a Professional Writer Now

The input space is limited by 250 symbols

What's Your Deadline?

Choose 3 Hours or More.
Back
2/4 steps

How Many Pages?

Back
3/4 steps

Sign Up and See Pricing

"You must agree to out terms of services and privacy policy"
Back
Get Offer

Pervasive Computing

Hire a Professional Writer Now

The input space is limited by 250 symbols

Deadline:2 days left
"You must agree to out terms of services and privacy policy"
Write my paper

It is the third generation of computing that plans to increase people’s efficiency and at the same time to simplify their everyday tasks at work and also, at home whenever they want and wherever they may be. It is the increasing trend on the way to setting in microprocessors in everyday matter such as refrigerator and television so that they can communicate information.

Difference of Traditional networking and Pervasive computing Now that we are improving and moving with better technologies in hand, instead of using the network to connect those computers that are being used directly by people, “Smart products” of Pervasive Computing will communicate over networks in such a way that people do not directly observe the communication between devices and programs.

Don't use plagiarized sources. Get Your Custom Essay on
Pervasive Computing
Just from $13,9/Page
Get custom paper

Here are the characteristics of the said product to further differentiate Pervasive from the Traditional one.

First, many will have small, low-cost processors with inadequate memory and little or no persistent storage. They will connect to other computing devices without the direct involvement of users.

Time and again, these devices will be connected by wireless networks. They will change swiftly, at times by being mobile, sometime by going on and offline at widely unstable rates. Over the time, they will be replaced (or fail) far more rapidly than is no common.

They will be used as resource of information, often sending that information into the center of the network to which they are attached. Advantages of Pervasive Computing Pervasive Computing will be very useful for all of us especially when it comes to managing the information we are into without any hassle and difficulty. Also, it will give us the power to access the applicable information stored on dominant networks which allows us to easily take action regardless of where we are or whenever it is.

Through this we can be very productive in our work and in everything we do since it’s easier for us to communicate and at the same time to do things simpler or let’s say without much complexity in life. Challenges of Pervasive Computing Though this kind of computing will be very helpful, we can’t deny the fact that reaching for this goal is really challenging and kind of unbelievable. But with enough knowledge and hard work, in time, attaining for it will not be really impossible at all. We hope. There are six challenges to consider before we can say, “We did it! The first one is that we need to upgrade our computing devices in order to support this technology. The second challenge is that it would be a difficult job, if possible, to produce all the “desired” computing devices but then it must have the ability to interconnect and communicate with other devices since the word pervasive implies “devices everywhere. ” Next is the lack of a system administrator. Most individuals who operate a personal computer at home have no intimate knowledge on how to manage a single workstation.

It would be unrealistic for the manufacturers of pervasive computing devices to look forward to their users to administer a complex network consisting of multiple devices. The fourth one is really true and undeniable. It talks about the privacy of the users and their security as well. The user may not be able to identify his limit on what information he is only allowed to gather since pervasive computing devices are everywhere and may be access anytime the user wants. Here are some of the questions involved in this problem.

Is it right to gather information from individuals without their knowing? What information may be gathered by one user? What information may not be gathered by the user? How may this information gathered be used, by whom, and under what circumstances? All of these questions and many more, need to be answered before pervasive computing takes hold and be fully implemented. The fifth challenge is a derived problem with regards to the fourth one. In here, we will question about the reliability it provides.

Since Pervasive devices will be everywhere, it will make sense that they must be reliable at the same time. But the question is, are they really reliable? This is one of the many questions in attaining Pervasive computing that must be worked out for. The last challenge to be counted is that Pervasive computing devices should be able to recognize the changes in their surroundings, then understand the action needed, and either complete the action or ask the user if they would like the action to be finished. But that is the big question here. Are these devices smart enough to do all this task?

Cite this Pervasive Computing

Pervasive Computing. (2016, Oct 06). Retrieved from https://graduateway.com/pervasive-computing/

Show less
  • Use multiple resourses when assembling your essay
  • Get help form professional writers when not sure you can do it yourself
  • Use Plagiarism Checker to double check your essay
  • Do not copy and paste free to download essays
Get plagiarism free essay

Search for essay samples now

Haven't found the Essay You Want?

Get my paper now

For Only $13.90/page