Information Technology Reference
In-Depth Information
CONCLUSION
modeled and analyzed different failure recovery
strategies in (Dabrowski, Mills, & Elder, 2002).
Jini and UPnP were the two protocols that they
tested. Performance responsiveness, effectiveness
and efficiency were explored in that work.
Service discovery is a critical component for
pervasive computing environments. We discussed
the elements of service discovery protocols and
their design issues. Classifications of the service
discovery protocols were given. Different protocol
designs were compared. Much research is still
needed to empower users to easily access network
information and services with desired feature in the
dynamic and heterogeneous pervasive computing
environments.
FUTURE RESEARCH DIRECTIONS
Dynamic, heterogeneous, secure, and private
properties remain the major challenges for service
discovery protocols in pervasive computing envi-
ronments. Although there are many service discov-
ery protocols proposed, no protocol addresses all
the issues and empowers users to access network
services and information without administrative
overhead. The main research issues need the ef-
forts from academia, industry, and international
standards development organizations.
REFERENCES
Adjie-Winoto, W., Schwartz, E., Balakrishnan,
H., & Lilley, J. (1999, December). The design and
implementation of an intentional naming system.
Paper presented at the 17th ACM Symposium
on Operating Systems Principles (SOSP '99),
Kiawah Island, SC.
First, secure and private service discovery
in unfamiliar environments is perhaps the
most challenging issue. In addition, perva-
sive computing environments may not be
easily separated by network firewalls as tra-
ditional enterprise or home environments.
Apple Computer Inc. (2003). Rendezvous website
Retrieved May, 2003, from http://developer.apple.
com/ macosx/rendezvous/
Balazinska, M., Balakrishnan, H., & Karger,
D. (2002, August). INS/Twine: A scalable peer-
to-peer architecture for intentional resource
discovery. Paper presented at the Pervasive 2002
- International Conference on Pervasive Comput-
ing, Zurich, Switzerland.
Second, it is unlikely that a single proto-
col will outperform all other protocols in
heterogeneous computing environments.
Different network topologies, protocol
stacks, hardware, and other constraints
pose the crucial challenges. Researchers
need to explore appropriate approaches to
balance specific and high performance so-
lutions and general solutions.
Bluetooth, S. I. G. (2001). Specification of the
Bluetooth system -- Core (version 1.1). Retrieved
from http://www.bluetooth.org/docs /Bluetooth_
V11_Core_22Feb01.pdf
Third, interoperability among different
service discovery protocols is important.
Without it, users will not be able to dis-
cover and access all available services.
Moreover, additional strategies and algo-
rithms are needed to select the proper ser-
vice discovery protocols for different com-
puting environments.
Chakraborty, A. (2000). A distributed architecture
for mobile, location-dependent applications. Mas-
ter's thesis, Massachusetts Institute of Technology,
Cambridge, MA.
Cheshire, S. (2002). Discovering named instances
of abstract services using DNS: Apple Computer .
Search WWH ::




Custom Search