Anda di halaman 1dari 86

Chapter-1

Mobile Computing Introduction

Wireless Communication

Most popular means of data communication

Enables online content to be viewed and accessed via


wireless devices such as cell phones, laptops and handheld devices

Wireless networks may operate on licensed or unlicensed


portions of the frequency spectrum.

Convenience and mobility are just two of the benefits

Wireless Communication

Def

Transmitting/receiving

voice

and

data

using

electromagnetic waves in open space The information from sender to receiver is carrier over a well-defined frequency band (channel) Each channel has a fixed frequency bandwidth and Capacity (bit-rate) Different channels can be used to transmit information in

parallel and independently.

Why Wireless Communication ?

Freedom from wires


No cost of installing wires or rewiring No bunches of wires running here and there Auto magical instantaneous communications without physical

connection setup, e.g., Bluetooth, WiFi

Global Coverage
Communications can reach where wiring is infeasible or costly

e.g., rural areas, old buildings, battlefield, vehicles, outer space


(through Communication Satellites)

Why Wireless Communication ?

Stay Connected
Roaming allows flexibility to stay connected anywhere and any time Rapidly growing market attests to public need for mobility and uninterrupted access

Flexibility
Services reach you wherever you go (Mobility). E.g, you dont have to go to your lab to check your mail Connect to multiple devices simultaneously (no physical connection required)

Why Wireless Communication ?

Increasing dependence on telecommunication services for business and personal reasons

Consumers and businesses are willing to pay for it

Basic Mantra: Stay connected anywhere, anytime.

Early history of wireless communication

1896 Guglielmo Marconi


First demonstration of wireless telegraphy (digital!)

long wave transmission, high transmission power necessary (> 200kW)

1907 Commercial transatlantic connections


huge base stations (30-100m high antennas)

1915 Wireless voice transmission New York -San Francisco 1920 Discovery of short waves by Marconi
reflection at the ionosphere smaller sender and receiver, possible due to the invention of the vacuum tube (1906, Lee DeForestand Robert von Lieben)

1926 Train-phone on the line Hamburg Berlin


wires parallel to the railroad track

Early history of wireless communication


1928 many TV broadcast trials (across Atlantic, color TV, news) 1933 Frequency modulation (E. H. Armstrong) 1958 A-Netz in Germany
analog, 160MHz, connection setup only from the mobile station, no handover, 80% coverage, 1971 11000 customers

1972 B-Netz in Germany


analog, 160MHz, connection setup from the fixed network too (but location of the mobile station has to be known) available also in A, NL and LUX, 1979 13000 customers in D

1979 NMT at 450MHz (Scandinavian countries) 1982 Start of GSM-specification


goal: pan-European digital mobile phone system with roaming

1983 Start of the American AMPS (Advanced Mobile Phone System, analog) 1984 CT-1 standard (Europe) for cordless telephones

Early history of wireless communication

1986 C-Netz in Germany


analog voice transmission, 450MHz, hand-over possible, digital signaling, automatic location of mobile device was in use until 2000, services: FAX, modem, X.25, e-mail, 98% coverage

1991 Specification of DECT


Digital European Cordless Telephone (today: Digital Enhanced Cordless Telecommunications)

1880-1900MHz, ~100-500m range, 120 duplex channels, 1.2Mbit/s data transmission, voice encryption, authentication, up to several 10000 user/km2, used in more than 50 countries

1992 Start of GSM


in D as D1 and D2, fully digital, 900MHz, 124 channels

automatic location, hand-over, cellular


roaming in Europe -now worldwide in more than 200 countries services: data with 9.6kbit/s, FAX, voice, ...

Early history of wireless communication

1994 E-Netz in Germany


GSM with 1800MHz, smaller cells

as Eplus in D (1997 98% coverage of the population)

1996 HiperLAN (High Performance Radio Local Area Network)


ETSI, standardization of type 1: 5.15 -5.30GHz, 23.5Mbit/s recommendations for type 2 and 3 (both 5GHz) and 4 (17GHz) as wireless ATM-networks (up to 155Mbit/s)

1997 Wireless LAN -IEEE802.11


IEEE standard, 2.4 -2.5GHz and infrared, 2Mbit/s already many (proprietary) products available in the beginning

1998 Specification of GSM successors


for UMTS (Universal Mobile Telecommunications System) as European proposals for IMT-2000

Iridium
66 satellites (+6 spare), 1.6GHz to the mobile phone

Early history of wireless communication

1999 Standardization of additional wireless LANs


IEEE standard 802.11b, 2.4-2.5GHz, 11Mbit/s

Bluetooth for piconets, 2.4GHz, <1Mbit/s

decision about IMT-2000several members of a family: UMTS, cdma2000, DECT, Start of WAP (Wireless Application Protocol) and i-mode
first step towards a unified Internet/mobile communication system access to many services via the mobile phone

2000 GSM with higher data rates


HSCSD offers up to 57,6kbit/s

first GPRS trials with up to 50 kbit/s (packet oriented!) UMTS auctions/beauty contests
Hype followed by disillusionment (50 B$ paid in Germany for 6 licenses!) Iridium goes bankrupt

2001 Start of 3G systems


Cdma2000 in Korea, UMTS tests in Europe, Foma (almost UMTS) in Japan

Early history of wireless communication

2002
WLAN hot-spots start to spread

2003
UMTS starts in Germany Start of DVB-T in Germany replacing analog TV

2005
WiMax starts as DSL alternative (not mobile) first ZigBee products

2006
HSDPA starts in Germany as fast UMTS download version offering > 3 Mbit/s WLAN draft for 250 Mbit/s (802.11n) using MIMO

WPA2 mandatory for Wi-Fi WLAN devices

2007
over 3.3 billion subscribers for mobile phones

Early history of wireless communication

2008
real Internet widely available on mobile phones (standard browsers, decent data rates) 7.2 Mbit/s HSDPA, 1.4 Mbit/s HSUPA available in Germany, more than 100 operators support HSPA worldwide, first LTE tests (>100 Mbit/s)

2009 the story continues with netbooks, iphones, VoIPoWLAN 2010 LTE available in some cities, new frequencies allocated
Reuse of old analog TV bands, LTE as DSL replacement for rural areas

Types of Wireless Communication

Radio Transmission
Easily generated, omni-directionally travel long distances, easily penetrate buildings Problems:
Frequency-dependent Relative low bandwidth for data communication Tightly licensed by the governments

Microwave Transmission
Widely used for long distance communication Gives a high S/N ratio, relatively inexpensive Problems:
dont pass through buildings well weather and frequency-dependent

Types of Wireless Communication

Infrared and Millimeter Waves


Widely used for short-range communication Unable to pass through solid objects Used for indoor wireless LANs, not for outdoors

Lightwave Transmission
Unguided optical signal, such as laser Connect two LANs in two buildings via laser mounted on their roof Unidirectional, easy to install, dont require license Problems:
Unable to penetrate rain or thick fog

Wireless Systems : Range Comparison

Types of Wireless Networks


1) Cellular Systems : Reuse channels to maximize capacity
Geographic region divided into cells
Frequencies/timeslots/codes reused at spatially-separated locations Base stations/Mobile Telephone Switching Offices (MTSOs)

coordinate handoff and control functions

Types of Wireless Networks


2) Wireless Local Area Networks (WLANs) : Reuse channels to maximize capacity
WLANs connect local computers (100m range => confined regions) Breaks data into packets allow users in a local area, such as a university campus or library, to form a network or gain access to the internet temporary network can be formed by a small number of users without the need of an access point Poor performance in some applications (e.g. video) Low mobility

Types of Wireless Networks

Types of Wireless Networks


3) Wireless Personal Area Networks (WPANs)
Two current technologies for wireless personal area networks Infra Red (IR) Bluetooth (IEEE 802.15) Bluetooth allows the connectivity of personal devices within an area of about 30 feet IR requires a direct line of site and the range is less.

Types of Wireless Networks

Types of Wireless Networks


4) Wireless Metropolitan Area Networks (WMANs)
Allows the connection of multiple networks in a metropolitan area Different buildings in a city

5) Wireless Wide Area Networks (WWANs)


Maintained over large areas such as cities or countries, Multiple satellite systems or antenna sites looked after by an ISP.

Types of systems are referred to as 2G (2nd Generation) systems

Types of Wireless Networks based on application

Wireless communication security


Achieve security is a major issue Three methods of security


WEP (Wired Equivalent Privacy)

SSID (Service Set Identifier)


MAC (Media Access Control) address filtering

Wireless communication security

WEP (Wired Equivalent Privacy)


To stop the interception of radio frequency signals by unauthorized users Suitable for small networks No key management protocol Each key must be entered manually into the clients Very time consuming Based on the RC4 encryption algorithm by RSA Data Systems Same key for encryption and decryption

Wireless communication security

SSID (Service Set Identifier)


Entire WLAN network splits up into different networks Each network has a unique identifier Identifiers will be programmed into multiple access points Client computer must be configured with a corresponding SSID identifier for that network If they match then access will be granted to the client computer

Wireless communication security

MAC (Media Access Control) address filtering


Each Access points are feed by a list of MAC addresses of client computers When a computer makes a request, its MAC address is compared to

that of the MAC address list on access point


Permission granted or denied Good for smaller networks

High rate of work in configuring each access point with each MAC
address

Advantages of Wireless communication

Greater use of Laptops - using wireless card Wireless connection eliminates the need of searching of a hub Greater integration of the technology into the curriculum Saves time With access easy, setup is fast.

Disadvantages of Wireless communication

Wireless systems are slower. Does not offer the performance of wired systems. Harder to supervise Security is major issue

Mobility

People can access information from anywhere, any

time even when on move.

Physical objects :
Mobility relate to movements of matters

Virtual objects:
Mobility relate to movements of bits and bytes

Wireless The beginning

To transmit data, frequency bands are required

Frequency regulatory agency :


Regulates usage and licensing of frequency bands In USA- Federal Communication Commission (FCC) In India-Telecom Regulatory Authority of India (TRAI)

In 1947, cellular phones are conceived at AT&T

Bell Labs

Small service area (Cell) frequency reuse

Wireless The beginning

Different countries have developed their own cellular

systems which are mutually incompatible.


Limited to national boundaries Same device can not be used in another network in

another country

So some standard for mobile phone is required In 1982, Conference of Posts and Telegraphs (CEPT) formed a study group called Group Special Mobile (GSM) to develop a standard for mobile system

Wireless The beginning

In 1989, GSM become a technical committee within

European
(ETSI)

Telecommunication

Standards

Institute

In 1990, phase-I of GSM standard was published

In mid 1991, commercial service of GSM was started


And GSM becomes Global System for Mobile

Communication

Wireless The beginning

Why GSM so popular?


The developers of GSM sat together to arrive at a standard
They provide standardization to guarantee interoperability

between different components, internetworking between different vendors International roaming between networks Emergence of SMS

Evolution of Wireless data

1G
Uses Analog technology FDMA (Frequency Division Multiple Access) for modulation Data is transmitted over circuits, - circuit switched data E.g. AMPS (Advanced Mobile Phone Service) in US

2G
Digital technology Combination of TDMA and FDMA E.g. GSM Data is transmitted over circuits, - circuit switched data Modem is used to make connection between device and network Like dial up connection

Evolution of Wireless data

2.5 G
Voice is digitized Packet switched technology Combination of TDMA and FDMA E.g. GPRS (General Packet Radio Service)

3G
Spread spectrum technique for media access and encoding Both data and voice use packet

E.g. UMTS(Universal Mobile Telecommunications System) and


CDMA 2000

Wireless PAN(Bluetooth, Infrared), wireless LAN (IEEE 802.11 family) , wireless WAN (GSM, GPRS, 3G)

Mobile Computing

A computing environment of physical mobility Useful to access data, information or other logical objects from any device in any network while on move

It allows user to perform task from anywhere using computing device (mobile device or desktop PC)

Different name
Mobile computing : computing environment moves with user Virtual Home environment : User experiences the same computing

environment at workplace as well as home Nomadic (travelling) computing : Same environment for both local/remote user Pervasive (persistent) computing Ubiquitous (everywhere) computing

Mobile Computing Functions

User Mobility
User should be able to move from one location to another and use the same

service

Network Mobility
User moves from one network to another and uses same service. User using WiFi network in campus and changes to 3G network outside Network itself is mobile like Mobile Ad hoc Network (MANET) Each node is a router. When moves , it changes its routing table structure

Bearer Mobility
User should be able to move from one bearer to another and use the same
service User uses WAP at home and changes to SMS bearer outside, to access same application

Mobile Computing Functions

Device Mobility
User should be able to move from one device to another and use the same service E.g. sales representative uses desktop at office and Palmtop when they are on the street

Session Mobility
User moves from one user-agent environment to another. E.g. user uses a service through his mobile device Suppose network connection is lost and he started unfinished session using

desktop at home

Agent Mobility
User-agent or application should be able to move from one node to another e.g. In cloud computing, applications will be moving from platform to platform

and infrastructure to infrastructure

Mobile Computing Functions

Mobile Computing Functions

User with device :


A fixed device like desktop computer, fixed telephone, set-top box A portable device like mobile phone, palmtop computers, pagers, handheld terminals

Network
Different network at different time
E.g. GSM, CDMA, Wireless LAN, Bluetooth

Gateway
Acts as interface between different transport bearers,
They convert specific bearer to another E.g. SMS gateway, WAP gateway

Mobile Computing Functions

Middleware
Handles presentation and rendering of the content on particular device Handles security of user

Content
Origin server and contents are stored Original server application, aggregation system Databases and storage devices

Mobile Computing Applications


Personal : belongs to user

Perishable (fresh) : Time sensitive (general news, breaking news, weather, sports)

Location-specific : related to geographic location e.g. GPS Corporate : corporate business information (mail, ERP ) Entertainment

Security in Mobile Computing


Security : a special challenge Mobile service is on air which can not control Existing infrastructure aims for increase revenue Technology is very complex and dependent on network operator Security policy are decided/implemented content provider by operator, not by

In mobile communication, user moves from place to place

Security need to be device independent , bearer independent

Standards

Documented agreements containing technical specifications or other criteria to be used as rules, guidelines or definition of characteristics

They ensures that materials, products or services are fit for their defined and agreed purpose

Standards are available to experts to challenge, examine and validate

Without standards, interoperability of goods and services will not be possible

Standards are provided by some special bodies at the regional, country as well as international level

Standards

In India, a standard body under government of India, called BIS (Bureau of Indian Standard)

Standards bodies
International Organization for Standardization (ISO) Internet Engineering Task Force (IETF) European Telecommunications Standards Institute (ETSI) Open Mobile Alliance (OMA) International Telecommunication Union (ITU)

Indian institute of Electronics and Electrical Engineering (IEEE)


World Wide Web Consortium (W3C) Etc.

SOC and AOC clients

Mobile Devices are always work on two modes


AOC (always on connectivity) must connected SOC(some time on connectivity) are not always connected

Soc devices :
Small pc
Requires high memory which used to store data ,when it is not connected to network Ability to store large amounts of data which is useful to user

Soc client technology typically requires a PocketPC or WinCE device in order to have sufficient processing power and data

storage capability.

SOC and AOC clients

AOC clients have small amounts of data or no data on board the device.

AOC clients require a wireless connection to access data and the user interface, or screen image.

AOC clients typically use a browser for application interactions AOC clients require transmission of the data and screen image for each user action.

Mobile workers need a wireless connection constantly available


in order to effective AOC client mobile devices.

Mobile computing OS

Also known as handheld operating system. Controls mobile device Operating systems that can be found on smartphones include Nokia's Symbian, Google's Android, Apple's iOS, RIM's

BlackBerry OS, Microsoft's Windows Phone, Linux, HP's webOS,


Samsung's Bada, Nokia's Maemo and MeeGo among many others.

Architecture for Mobile computing

Three Tier architecture


User Interface (Presentation Tier)

Process Management (Application Tier)


Database management (Data Tier)

User Interface
Deals with user facing device handling and rendering

Includes user system interface where user services (session, text input, dialog) resides

Process Management
Contains application programs or process management where business logic and rules are executed

Hundreds of users

Database management
Database access and management

Architecture for Mobile computing


Three Tier architecture is for client/server programming Provides


Performance , Flexibility, Maintainability, Reusability, Scalability

Three tier architecture


For universal access, server should connect to ubiquitous network i.e. internet. Web browser ubiquitous Browser agent Internet Explorer, Netscape Navigator or Mozilla

Three tier architecture

Presentation (Tier 1)
User facing system in the first tier Layer of agent application and systems Tier is responsible for presenting the information to the end user To receive information visual and audio means To send information keyboard, pen, touch screen, voice Includes web browser , WAP browser and customized client program Mobile computing agent needs to be context aware and device independent

Three tier architecture

Application (Tier 2)
Engine of ubiquitous application Performs the business logic of processing user input, obtaining data and making decisions Includes technologies CGIs, Java, JSP, .NET services, PHP deployed in the product likes Apache, web sphere, Web logic, iPlanet etc.. Application tier is independent from presentation and database tier

Another

functionalities

decision

on

rendering,

network

management, security, data store access etc. Different available middle wares (software/middleware framework)are

Three tier architecture

Application (Tier 2) (Cont..)


Middleware framework (MF): a layer of software, sits in the middle between operating system and the user facing software MF includes distributes objects and components, message oriented communication, database connectors, mobile application support,

transaction drivers etc.


Middleware categories
Message oriented Middleware (MOM) Transaction Processing (TP) Middleware Database Middleware Communication Middleware Distributed object and Components Transcoding Middleware

Three tier architecture

Message-oriented Middleware (MOM)


Connects different applications through asynchronous message exchanges It works independently from the platform or processor of application Message can contain formatted data, requests for action or response Provides message queue between two interoperating applications

If destination application is busy, the message is held in a temporary storage


location until it can be processed Generally asynchronous, peer-to-peer and works in publish/subscribe fashion Appropriate for event-driven application E.g. Message Queue from IBM (MQ series), Java Message Service (JMS)

Three tier architecture

Transaction Processing (TP) Middleware


Provides tools and environment for developing transaction based distributed application Input data point of information source Output data point of information sink

TP is used in data management, network access, security systems, delivery


order processing, airline reservations, customer services etc.. Capable of providing services to thousands of clients in distributed client/server environment

It maps numerous client requests through application service routines to


different application tasks

Three tier architecture

Transaction Processing (TP) Middleware (Cont..)


It is independent of the database architecture Optimizes the use of resources by multiplexing many client functions on to much smaller set of application service routines It provides services for delivery order processing, terminal and forms

management, data management, network access, authorization and


security

Three tier architecture

Communication Middleware
Connects one application to another through some software like telnet

Useful in telecommunication world

Distributed Objects and components


CORBA (Common Object Request Broker Architecture)

It simplifies many network programming tasks like object registration, object


location and activation, request demultiplexing, framing and error handling, parameter marshalling and demarshalling etc. CORBA is vendor independent infrastructure CORBA based program from any vendor on any computer, any OS, programming language and network can interoperate with a CORBA based program from same or different vendor Useful at server side to handle multiple different clients

Three tier architecture

Transcoding Middleware
Used to transcode one format of data to another format to suit the need of

client, device
E.g. to access a web site through mobile phone supporting WAP, we need to transcode HTML page to WML page so that the mobile phone can access it Accessing a map through PDA Used for content adaptation which is also required for meeting network bandwidth needs ICAP (Internet Content Adaption Protocol)

Three tier architecture

Data (Tier -3)


Used to store data needed by application and acts as a repository for both

temporary and permanent data


Database can be any sophisticated relational database, legacy hierarchical database or simple text files Data can be stored in simple XML format for interoperability with other systems and data sources Database middleware (data connectors) runs between the application program and database E.g. ODBC, JDBC

Design Consideration for Mobile Computing

The mobile computing environment needs to be contextindependent as well as context-sensitive.

Information related to surrounding environment of an actor is


called Context Information.

Context means, all the information that helps determine the

state of an object (actor)

Object can be a person, a device, a place, a physical object, surrounding environment.

Context data is captured and decision can be made about how


to adapt content or behavior to suit the context

Design Consideration for Mobile Computing

Ways in which content and behavior should be adapted are with context awareness

1. Content

Build each application with context awareness


Different services for different client context (devices) E.g. For mobile banking application through
Internet (http://www.mybank.com/inet.html) PDA (http://www.mybank.com/palm.heml) Mobile phone using WAP (http://www.mybank.com/wap.wml)

User will use computer to access service through Internet-big web pages, drop down menus, advertisement for new schemes For PDA device, the screen will be small-no product animation For WAP service, the completely different interface

Design Consideration for Mobile Computing


2.

Content switch on context


Provide intelligence for adaption of content within service

Adaptation is transparent to user


Service is same for Internet, PDA, WAP All access to bank will use same site (http://www.mybank.com) An intelligent piece of code identifies the agent device or context 3.

Content transcoding on context


Provide middleware platform that performs the adaption of the content based on the context and behavior of the device Adaptation is transparent to client and application middleware identifies the context either from the HTTP or other parameters Middleware transcodes the code from html(or xml) to html and wml on fly

Design Consideration for Mobile Computing


2.

Fig. 2.5

Design Consideration for Mobile Computing

Client Context Manager


Mobile computing application needs to operate in dynamic conditions Various device characteristics and network condition Mobile environment demands a reactive platform that can make decisions about how to respond to changes to device capability, user preferences, enterprise policy, network policy and many other environmental factors Context can be used as the basis by which an adaptation manager or algorithm decides to modify content or application behavior Thus we need Client context manager to gather and maintain information

pertaining to the client device, user, network and environment surrounding


each mobile device. These information will be provided by a set of Awareness Modules

Design Consideration for Mobile Computing

Client Context Manager(Cont..)


Awareness Modules are sensors of various kinds (Hardware/Software) Hardware sensors can be used to identify the precise location of a user

Software sensors can be used to determine the type of user agent


These awareness modules can be in the device, network or even in the middleware Some of context information
Identity Spatial Information : related to location, space, speed, acceleration Temporal Information :time of the day, date, time zone , season of the year Environment Information :temperature, humidity, speed of wind, moisture, natural light Social Situation : whether user in meeting/ party Resources that are nearby :accessible resources, hosts or other information sinks Availability of resources : battery power, processing power, display, I/O capacity, bandwidth Physiological measurements : blood pressure, heart rate, muscle activity

Design Consideration for Mobile Computing

Client Context Manager(Cont..)


A system is Context-aware if it can extract, interpret and use context-related information to adapt its functionality to the current context To extract information, application software must include some intelligence to process information and deduce the meaning. Three major aspects of context management
Context Sensing : The way in which context data is obtained Context representation : The way in which context information is stored and transported Context interpretation : The way in which meaning is obtained from the context represe4ntation

W3C has proposed a standard for context information called CC/PP


(Composite Capability / Preference Profiles) for device capability description and user preferences

Design Consideration for Mobile Computing

CC/PP
Proposed W3C standard specially for wireless devices (mobiles / PDAs) CC/PP is based on RDF (Resource Description Framework) and is coded in XML CC/PP profile contains a number of attribute names and associated values that are used by an application to determine the appropriate form of a resource to

deliver to a client
This helps the client to describe its capabilities to origin server and other sender of data Simple steps followed by server to use CC/PP profile
Device sends serialized profile model with request for content
Origin server receives RDF profile and converts it into an in-memory model (Document model) The profile for the requested document is retrieved and an in-memory is created (Device profile model) The device profile model is matched against the document profile model A suitable representation of the document is chosen or dynamically generated Document is returned to device and presented

Design Consideration for Mobile Computing

Policy Manager
It specifies rules for adaptation when a user is at certain location, regardless of the information provided in an application or document profile A policy is a set of rules needs to be followed under certain conditions Policy manager will be able to define policy for documents / services and assign roles to users Each role will have permissions, prohibitions and obligations associated with it Each policy will have access rights associated with respect to read, write and execute A policy with role and current context information will be able to determine what actions a user is allowed to perform, or what actions a user is obliged to perform

Design Consideration for Mobile Computing

Semantic Web
Policies are set of rules. Semantic web is useful to make machine understand policies and behave in expected fashion Data in the Web is generally hidden away in HTML files Some contents are useful in some context but not all context

Semantic web is targeted to provide facilities to put machine understandable data on web
not just for display, but for automation, security, filtering , integration and reuse of data across various application Large number of semantic web applications - variety of different tasks- increasing the

modularity of applications on the web


Semantic Web is built on syntaxes which use URI (Uniform Resource Identifier) to represent data, usually in tuple-based structures Many tuples of URI data that can be held in databases or interchanged on the WWW using

a set of syntaxes developed for tasks

Design Consideration for Mobile Computing

Security Manager
Provides a secure connection between the client device and the original server Security policies Confidentiality : Nobody will be able to see the message (Encryption) Integrity : Nobody will be able to change the content (Hashing) Availability : Nobody will be able to stop the service (Web Server, Firewall) Non-repudiation : Nobody after using the system can claim otherwise (Digital Signature) Trust : Complex issues of knowing what resources, services and agents to trust. The system will be trusted (Trusted Third Party)

Design Consideration for Mobile Computing

Platform for Privacy Preference Projects (P3P)


Standard defined by W3C Enables web sites to express their privacy practices in a standardized format so that can be retrieved and interpreted by user agents Key information about the content f the web site can be conveyed to the user Any discrepancies between a sites practices and the uses preferences can be flagged as

well
The goal is to increase user trust and confidence in the web Provides a technical mechanism to inform users about privacy policies about the site To help the users to decide whether to release personal information or not P3P does not provide any mechanism for ensuring that sites act according to their policies

Design Consideration for Mobile Computing

Adaptability Manager
Responsible for adapting content, behavior, and other aspects according to context and policy May take actions depending on the information passed to it by context manager They providing transcoding of content so that it may be viewed on a particular device Appends location specific information to documents

Content Adaption and Transcoding


In ubiquitous situation, Content should be able to adapt to dynamic situations Adaptation may be static or dynamic Content adaption can be performed either at the content level at the server or at the agent in the client device It can be done at middle layer through middleware software

Design Consideration for Mobile Computing

Content Adaption and Transcoding (Cont..)


Content adaptation needs to consider the following attributes

Physical capabilities of the device


Logical capabilities of the device Effective network bandwidth Payload

Transcoding can be classified as


Spatial : transcoding in space/ dimension. Standard frame is downscaled and reduced Temporal : Reduction of number of frames in the time scale Color : For monochrome clients Code : Changes coding from one standard to another Object or semantic : Extract objects and transfer them with low compression to maintain both details and speed

Design Consideration for Mobile Computing

Content Adaption and Transcoding (Cont..)


Server side content adaptation InfoPyramid

InfoPyramid creates context-aware content through static transcoding


Transcoding is done off-line at the content creation time Each atomic item of the document is analyzed to determine its resource requirement The resource requirement is determined by the following attributes Static content size in bits Display size such as height, width and area Streaming bit-rate Color requirement Compression formats Hardware requirements

Design Consideration for Mobile Computing

Content Adaption and Transcoding (Cont..)


Client side content adaptation Done by agent application based on its

capabilities
Can be quite effective for static images Not very effective for streaming payload delivery Content adaptation at Middleware provides transparent service to device and content Main drawbacks Content providers do not have control over how their content will appear to

client device
HTML tags mainly provide formatting information rather than semantic information Transcoding could be difficult to apply to many media such as video and audio

Design Consideration for Mobile Computing

Content Rating and Filtering


Provides more discipline environment in electronics world

W3C proposed a standard PICS (Platform for Internet Content Selection) for
rating of web content

Depending upon rating, filtering of contents will take place PICS specification is a set of technical specifications for labels (meta-data) that help software and rating service to work together

Rating and labeling service chooses their own criteria for proper identification and filtering of contents

Generally, service provides defines rating


Rating can be self-rating or third party labeling of content In third party labeling, independent rating agency

Design Consideration for Mobile Computing

Content Rating and Filtering (cont..)


PICS is a general meta-data system, meaning that labels can provide any

kind of descriptive information about Internet material


The main aim of PICS is to use meta for Digital Signature : Coupling the ability to make assertion with a cryptographic block Intellectual Property Rights Management : Using meta data system to label Web resources with respect to their authors, owners and right managements information Privacy : Using meta-data system to allow sites to make assertion about their privacy practices and for users to express their preferences for the type of interaction they want to have with those sites Personalization : Based on some policy, the content can be personalized to

suit the need of the user and the service

Design Consideration for Mobile Computing

Seamless Communication
Ubiquitous system will be available and accessible from anywhere, anytime

and through any network and even during moving


Seamless communication combines seamless handoffs and seamless roaming Handoff is the process by which the connection to the network is moved from one base station (access point) to another base station within the same network Roaming will involve the point of attachment moving from one base station of one network to another base station of another network Handoff should work while a session is in progress Seamless communication offers users freedom to roam across different wireless networks True seamless roaming will include handoff and roaming in a heterogeneous

hybrid network

Design Consideration for Mobile Computing

Seamless Communication (Cont..)


In seamless roaming, the following aspects need to be maintained and

managed in a seamless fashion without any disruption of service


Authentication across network of boundaries Authorization across network boundaries Billing and charging data collection End-to-end data security across roaming Handoff between wireless access points Roaming between networks

Session migration
IP mobility

Design Consideration for Mobile Computing

Autonomous Computing
The purpose of autonomous system is to free users and system administrators from the details of system operation and maintenance complexity. The essence of autonomous system is self-management, which is a combination of the following function
Self-configurable : System will configure itself automatically in accordance with highlevel policies Self-optimizing : System will continuously look for ways to improve its operation with respect to resource, cost and performance Self-healing : System will detect , diagnose and repair localized problems resulting from bugs or failure Self-protecting : System will defend itself from external attacks and will not propagate and cascade failure to other parts of the system Self-upgradable : System will be able to grow and upgrade itself within the control of the above properties

Context Aware Systems

A system is Context-aware if it can extract, interpret and use context-related information to adapt its functionality to the current context

Context manager has to collect information about location, mobile device, network, users , environment and any other context information

Location information
Helps us to identify the location of the user/device Collect through the device or through network From device : Find location through GPS(Global Positioning Systems) From Network : device can be determined through timing advance technology which relates to the successful call

Context Aware Systems

Device information
Helps us to know the characteristics of the device Required to determine the resource capability and user interface capability Collect through the device or through network Through user agent parameter of HTTP protocol gives device information From network side, information can be obtained from EIR (Equipment Identity Register) database of the network

Network information
User moves from network to network, even in heterogeneous environment Network information is required to identify the capability of the network This information includes security infrastructures, services offered by the network

Context Aware Systems

User Information
It is required to identify the user correctly From security point, whether user is authorized or not Need to ensure that nobody else is impersonating For charging the user properly we need to refer to some subscriber information available in the network

Environment Information
The temperature, elevation, moisture and other ambient-related information

Making existing applications Mobile-enabled

The ways by which applications made ubiquitous and mobile computing capable
Enhance existing application Rent an application from ISP Write a new application Buy a packaged solution Bridge the gap through middleware

Anda mungkin juga menyukai