Chapter-1
Mobile Computing Introduction
Wireless Communication
Most popular means of data communication
Enables online content to be viewed and accessed via
wireless devices such as cell phones, laptops and handheld devices
Wireless networks may operate on licensed or unlicensed
portions of the frequency spectrum.
Convenience and mobility are just two of the benefits
Wireless Communication
Def
Transmitting/receiving
voice
and
data
using
electromagnetic waves in open space The information from sender to receiver is carrier over a well-defined frequency band (channel) Each channel has a fixed frequency bandwidth and Capacity (bit-rate) Different channels can be used to transmit information in
parallel and independently.
Why Wireless Communication ?
Freedom from wires
No cost of installing wires or rewiring No bunches of wires running here and there Auto magical instantaneous communications without physical
connection setup, e.g., Bluetooth, WiFi
Global Coverage
Communications can reach where wiring is infeasible or costly
e.g., rural areas, old buildings, battlefield, vehicles, outer space
(through Communication Satellites)
Why Wireless Communication ?
Stay Connected
Roaming allows flexibility to stay connected anywhere and any time Rapidly growing market attests to public need for mobility and uninterrupted access
Flexibility
Services reach you wherever you go (Mobility). E.g, you dont have to go to your lab to check your mail Connect to multiple devices simultaneously (no physical connection required)
Why Wireless Communication ?
Increasing dependence on telecommunication services for business and personal reasons
Consumers and businesses are willing to pay for it
Basic Mantra: Stay connected anywhere, anytime.
Early history of wireless communication
1896 Guglielmo Marconi
First demonstration of wireless telegraphy (digital!)
long wave transmission, high transmission power necessary (> 200kW)
1907 Commercial transatlantic connections
huge base stations (30-100m high antennas)
1915 Wireless voice transmission New York -San Francisco 1920 Discovery of short waves by Marconi
reflection at the ionosphere smaller sender and receiver, possible due to the invention of the vacuum tube (1906, Lee DeForestand Robert von Lieben)
1926 Train-phone on the line Hamburg Berlin
wires parallel to the railroad track
Early history of wireless communication
1928 many TV broadcast trials (across Atlantic, color TV, news) 1933 Frequency modulation (E. H. Armstrong) 1958 A-Netz in Germany
analog, 160MHz, connection setup only from the mobile station, no handover, 80% coverage, 1971 11000 customers
1972 B-Netz in Germany
analog, 160MHz, connection setup from the fixed network too (but location of the mobile station has to be known) available also in A, NL and LUX, 1979 13000 customers in D
1979 NMT at 450MHz (Scandinavian countries) 1982 Start of GSM-specification
goal: pan-European digital mobile phone system with roaming
1983 Start of the American AMPS (Advanced Mobile Phone System, analog) 1984 CT-1 standard (Europe) for cordless telephones
Early history of wireless communication
1986 C-Netz in Germany
analog voice transmission, 450MHz, hand-over possible, digital signaling, automatic location of mobile device was in use until 2000, services: FAX, modem, X.25, e-mail, 98% coverage
1991 Specification of DECT
Digital European Cordless Telephone (today: Digital Enhanced Cordless Telecommunications)
1880-1900MHz, ~100-500m range, 120 duplex channels, 1.2Mbit/s data transmission, voice encryption, authentication, up to several 10000 user/km2, used in more than 50 countries
1992 Start of GSM
in D as D1 and D2, fully digital, 900MHz, 124 channels
automatic location, hand-over, cellular
roaming in Europe -now worldwide in more than 200 countries services: data with 9.6kbit/s, FAX, voice, ...
Early history of wireless communication
1994 E-Netz in Germany
GSM with 1800MHz, smaller cells
as Eplus in D (1997 98% coverage of the population)
1996 HiperLAN (High Performance Radio Local Area Network)
ETSI, standardization of type 1: 5.15 -5.30GHz, 23.5Mbit/s recommendations for type 2 and 3 (both 5GHz) and 4 (17GHz) as wireless ATM-networks (up to 155Mbit/s)
1997 Wireless LAN -IEEE802.11
IEEE standard, 2.4 -2.5GHz and infrared, 2Mbit/s already many (proprietary) products available in the beginning
1998 Specification of GSM successors
for UMTS (Universal Mobile Telecommunications System) as European proposals for IMT-2000
Iridium
66 satellites (+6 spare), 1.6GHz to the mobile phone
Early history of wireless communication
1999 Standardization of additional wireless LANs
IEEE standard 802.11b, 2.4-2.5GHz, 11Mbit/s
Bluetooth for piconets, 2.4GHz, <1Mbit/s
decision about IMT-2000several members of a family: UMTS, cdma2000, DECT, Start of WAP (Wireless Application Protocol) and i-mode
first step towards a unified Internet/mobile communication system access to many services via the mobile phone
2000 GSM with higher data rates
HSCSD offers up to 57,6kbit/s
first GPRS trials with up to 50 kbit/s (packet oriented!) UMTS auctions/beauty contests
Hype followed by disillusionment (50 B$ paid in Germany for 6 licenses!) Iridium goes bankrupt
2001 Start of 3G systems
Cdma2000 in Korea, UMTS tests in Europe, Foma (almost UMTS) in Japan
Early history of wireless communication
2002
WLAN hot-spots start to spread
2003
UMTS starts in Germany Start of DVB-T in Germany replacing analog TV
2005
WiMax starts as DSL alternative (not mobile) first ZigBee products
2006
HSDPA starts in Germany as fast UMTS download version offering > 3 Mbit/s WLAN draft for 250 Mbit/s (802.11n) using MIMO
WPA2 mandatory for Wi-Fi WLAN devices
2007
over 3.3 billion subscribers for mobile phones
Early history of wireless communication
2008
real Internet widely available on mobile phones (standard browsers, decent data rates) 7.2 Mbit/s HSDPA, 1.4 Mbit/s HSUPA available in Germany, more than 100 operators support HSPA worldwide, first LTE tests (>100 Mbit/s)
2009 the story continues with netbooks, iphones, VoIPoWLAN 2010 LTE available in some cities, new frequencies allocated
Reuse of old analog TV bands, LTE as DSL replacement for rural areas
Types of Wireless Communication
Radio Transmission
Easily generated, omni-directionally travel long distances, easily penetrate buildings Problems:
Frequency-dependent Relative low bandwidth for data communication Tightly licensed by the governments
Microwave Transmission
Widely used for long distance communication Gives a high S/N ratio, relatively inexpensive Problems:
dont pass through buildings well weather and frequency-dependent
Types of Wireless Communication
Infrared and Millimeter Waves
Widely used for short-range communication Unable to pass through solid objects Used for indoor wireless LANs, not for outdoors
Lightwave Transmission
Unguided optical signal, such as laser Connect two LANs in two buildings via laser mounted on their roof Unidirectional, easy to install, dont require license Problems:
Unable to penetrate rain or thick fog
Wireless Systems : Range Comparison
Types of Wireless Networks
1) Cellular Systems : Reuse channels to maximize capacity
Geographic region divided into cells
Frequencies/timeslots/codes reused at spatially-separated locations Base stations/Mobile Telephone Switching Offices (MTSOs)
coordinate handoff and control functions
Types of Wireless Networks
2) Wireless Local Area Networks (WLANs) : Reuse channels to maximize capacity
WLANs connect local computers (100m range => confined regions) Breaks data into packets allow users in a local area, such as a university campus or library, to form a network or gain access to the internet temporary network can be formed by a small number of users without the need of an access point Poor performance in some applications (e.g. video) Low mobility
Types of Wireless Networks
Types of Wireless Networks
3) Wireless Personal Area Networks (WPANs)
Two current technologies for wireless personal area networks Infra Red (IR) Bluetooth (IEEE 802.15) Bluetooth allows the connectivity of personal devices within an area of about 30 feet IR requires a direct line of site and the range is less.
Types of Wireless Networks
Types of Wireless Networks
4) Wireless Metropolitan Area Networks (WMANs)
Allows the connection of multiple networks in a metropolitan area Different buildings in a city
5) Wireless Wide Area Networks (WWANs)
Maintained over large areas such as cities or countries, Multiple satellite systems or antenna sites looked after by an ISP.
Types of systems are referred to as 2G (2nd Generation) systems
Types of Wireless Networks based on application
Wireless communication security
Achieve security is a major issue Three methods of security
WEP (Wired Equivalent Privacy)
SSID (Service Set Identifier)
MAC (Media Access Control) address filtering
Wireless communication security
WEP (Wired Equivalent Privacy)
To stop the interception of radio frequency signals by unauthorized users Suitable for small networks No key management protocol Each key must be entered manually into the clients Very time consuming Based on the RC4 encryption algorithm by RSA Data Systems Same key for encryption and decryption
Wireless communication security
SSID (Service Set Identifier)
Entire WLAN network splits up into different networks Each network has a unique identifier Identifiers will be programmed into multiple access points Client computer must be configured with a corresponding SSID identifier for that network If they match then access will be granted to the client computer
Wireless communication security
MAC (Media Access Control) address filtering
Each Access points are feed by a list of MAC addresses of client computers When a computer makes a request, its MAC address is compared to
that of the MAC address list on access point
Permission granted or denied Good for smaller networks
High rate of work in configuring each access point with each MAC
address
Advantages of Wireless communication
Greater use of Laptops - using wireless card Wireless connection eliminates the need of searching of a hub Greater integration of the technology into the curriculum Saves time With access easy, setup is fast.
Disadvantages of Wireless communication
Wireless systems are slower. Does not offer the performance of wired systems. Harder to supervise Security is major issue
Mobility
People can access information from anywhere, any
time even when on move.
Physical objects :
Mobility relate to movements of matters
Virtual objects:
Mobility relate to movements of bits and bytes
Wireless The beginning
To transmit data, frequency bands are required
Frequency regulatory agency :
Regulates usage and licensing of frequency bands In USA- Federal Communication Commission (FCC) In India-Telecom Regulatory Authority of India (TRAI)
In 1947, cellular phones are conceived at AT&T
Bell Labs
Small service area (Cell) frequency reuse
Wireless The beginning
Different countries have developed their own cellular
systems which are mutually incompatible.
Limited to national boundaries Same device can not be used in another network in
another country
So some standard for mobile phone is required In 1982, Conference of Posts and Telegraphs (CEPT) formed a study group called Group Special Mobile (GSM) to develop a standard for mobile system
Wireless The beginning
In 1989, GSM become a technical committee within
European
(ETSI)
Telecommunication
Standards
Institute
In 1990, phase-I of GSM standard was published
In mid 1991, commercial service of GSM was started
And GSM becomes Global System for Mobile
Communication
Wireless The beginning
Why GSM so popular?
The developers of GSM sat together to arrive at a standard
They provide standardization to guarantee interoperability
between different components, internetworking between different vendors International roaming between networks Emergence of SMS
Evolution of Wireless data
1G
Uses Analog technology FDMA (Frequency Division Multiple Access) for modulation Data is transmitted over circuits, - circuit switched data E.g. AMPS (Advanced Mobile Phone Service) in US
2G
Digital technology Combination of TDMA and FDMA E.g. GSM Data is transmitted over circuits, - circuit switched data Modem is used to make connection between device and network Like dial up connection
Evolution of Wireless data
2.5 G
Voice is digitized Packet switched technology Combination of TDMA and FDMA E.g. GPRS (General Packet Radio Service)
3G
Spread spectrum technique for media access and encoding Both data and voice use packet
E.g. UMTS(Universal Mobile Telecommunications System) and
CDMA 2000
Wireless PAN(Bluetooth, Infrared), wireless LAN (IEEE 802.11 family) , wireless WAN (GSM, GPRS, 3G)
Mobile Computing
A computing environment of physical mobility Useful to access data, information or other logical objects from any device in any network while on move
It allows user to perform task from anywhere using computing device (mobile device or desktop PC)
Different name
Mobile computing : computing environment moves with user Virtual Home environment : User experiences the same computing
environment at workplace as well as home Nomadic (travelling) computing : Same environment for both local/remote user Pervasive (persistent) computing Ubiquitous (everywhere) computing
Mobile Computing Functions
User Mobility
User should be able to move from one location to another and use the same
service
Network Mobility
User moves from one network to another and uses same service. User using WiFi network in campus and changes to 3G network outside Network itself is mobile like Mobile Ad hoc Network (MANET) Each node is a router. When moves , it changes its routing table structure
Bearer Mobility
User should be able to move from one bearer to another and use the same
service User uses WAP at home and changes to SMS bearer outside, to access same application
Mobile Computing Functions
Device Mobility
User should be able to move from one device to another and use the same service E.g. sales representative uses desktop at office and Palmtop when they are on the street
Session Mobility
User moves from one user-agent environment to another. E.g. user uses a service through his mobile device Suppose network connection is lost and he started unfinished session using
desktop at home
Agent Mobility
User-agent or application should be able to move from one node to another e.g. In cloud computing, applications will be moving from platform to platform
and infrastructure to infrastructure
Mobile Computing Functions
Mobile Computing Functions
User with device :
A fixed device like desktop computer, fixed telephone, set-top box A portable device like mobile phone, palmtop computers, pagers, handheld terminals
Network
Different network at different time
E.g. GSM, CDMA, Wireless LAN, Bluetooth
Gateway
Acts as interface between different transport bearers,
They convert specific bearer to another E.g. SMS gateway, WAP gateway
Mobile Computing Functions
Middleware
Handles presentation and rendering of the content on particular device Handles security of user
Content
Origin server and contents are stored Original server application, aggregation system Databases and storage devices
Mobile Computing Applications
Personal : belongs to user
Perishable (fresh) : Time sensitive (general news, breaking news, weather, sports)
Location-specific : related to geographic location e.g. GPS Corporate : corporate business information (mail, ERP ) Entertainment
Security in Mobile Computing
Security : a special challenge Mobile service is on air which can not control Existing infrastructure aims for increase revenue Technology is very complex and dependent on network operator Security policy are decided/implemented content provider by operator, not by
In mobile communication, user moves from place to place
Security need to be device independent , bearer independent
Standards
Documented agreements containing technical specifications or other criteria to be used as rules, guidelines or definition of characteristics
They ensures that materials, products or services are fit for their defined and agreed purpose
Standards are available to experts to challenge, examine and validate
Without standards, interoperability of goods and services will not be possible
Standards are provided by some special bodies at the regional, country as well as international level
Standards
In India, a standard body under government of India, called BIS (Bureau of Indian Standard)
Standards bodies
International Organization for Standardization (ISO) Internet Engineering Task Force (IETF) European Telecommunications Standards Institute (ETSI) Open Mobile Alliance (OMA) International Telecommunication Union (ITU)
Indian institute of Electronics and Electrical Engineering (IEEE)
World Wide Web Consortium (W3C) Etc.
SOC and AOC clients
Mobile Devices are always work on two modes
AOC (always on connectivity) must connected SOC(some time on connectivity) are not always connected
Soc devices :
Small pc
Requires high memory which used to store data ,when it is not connected to network Ability to store large amounts of data which is useful to user
Soc client technology typically requires a PocketPC or WinCE device in order to have sufficient processing power and data
storage capability.
SOC and AOC clients
AOC clients have small amounts of data or no data on board the device.
AOC clients require a wireless connection to access data and the user interface, or screen image.
AOC clients typically use a browser for application interactions AOC clients require transmission of the data and screen image for each user action.
Mobile workers need a wireless connection constantly available
in order to effective AOC client mobile devices.
Mobile computing OS
Also known as handheld operating system. Controls mobile device Operating systems that can be found on smartphones include Nokia's Symbian, Google's Android, Apple's iOS, RIM's
BlackBerry OS, Microsoft's Windows Phone, Linux, HP's webOS,
Samsung's Bada, Nokia's Maemo and MeeGo among many others.
Architecture for Mobile computing
Three Tier architecture
User Interface (Presentation Tier)
Process Management (Application Tier)
Database management (Data Tier)
User Interface
Deals with user facing device handling and rendering
Includes user system interface where user services (session, text input, dialog) resides
Process Management
Contains application programs or process management where business logic and rules are executed
Hundreds of users
Database management
Database access and management
Architecture for Mobile computing
Three Tier architecture is for client/server programming Provides
Performance , Flexibility, Maintainability, Reusability, Scalability
Three tier architecture
For universal access, server should connect to ubiquitous network i.e. internet. Web browser ubiquitous Browser agent Internet Explorer, Netscape Navigator or Mozilla
Three tier architecture
Presentation (Tier 1)
User facing system in the first tier Layer of agent application and systems Tier is responsible for presenting the information to the end user To receive information visual and audio means To send information keyboard, pen, touch screen, voice Includes web browser , WAP browser and customized client program Mobile computing agent needs to be context aware and device independent
Three tier architecture
Application (Tier 2)
Engine of ubiquitous application Performs the business logic of processing user input, obtaining data and making decisions Includes technologies CGIs, Java, JSP, .NET services, PHP deployed in the product likes Apache, web sphere, Web logic, iPlanet etc.. Application tier is independent from presentation and database tier
Another
functionalities
decision
on
rendering,
network
management, security, data store access etc. Different available middle wares (software/middleware framework)are
Three tier architecture
Application (Tier 2) (Cont..)
Middleware framework (MF): a layer of software, sits in the middle between operating system and the user facing software MF includes distributes objects and components, message oriented communication, database connectors, mobile application support,
transaction drivers etc.
Middleware categories
Message oriented Middleware (MOM) Transaction Processing (TP) Middleware Database Middleware Communication Middleware Distributed object and Components Transcoding Middleware
Three tier architecture
Message-oriented Middleware (MOM)
Connects different applications through asynchronous message exchanges It works independently from the platform or processor of application Message can contain formatted data, requests for action or response Provides message queue between two interoperating applications
If destination application is busy, the message is held in a temporary storage
location until it can be processed Generally asynchronous, peer-to-peer and works in publish/subscribe fashion Appropriate for event-driven application E.g. Message Queue from IBM (MQ series), Java Message Service (JMS)
Three tier architecture
Transaction Processing (TP) Middleware
Provides tools and environment for developing transaction based distributed application Input data point of information source Output data point of information sink
TP is used in data management, network access, security systems, delivery
order processing, airline reservations, customer services etc.. Capable of providing services to thousands of clients in distributed client/server environment
It maps numerous client requests through application service routines to
different application tasks
Three tier architecture
Transaction Processing (TP) Middleware (Cont..)
It is independent of the database architecture Optimizes the use of resources by multiplexing many client functions on to much smaller set of application service routines It provides services for delivery order processing, terminal and forms
management, data management, network access, authorization and
security
Three tier architecture
Communication Middleware
Connects one application to another through some software like telnet
Useful in telecommunication world
Distributed Objects and components
CORBA (Common Object Request Broker Architecture)
It simplifies many network programming tasks like object registration, object
location and activation, request demultiplexing, framing and error handling, parameter marshalling and demarshalling etc. CORBA is vendor independent infrastructure CORBA based program from any vendor on any computer, any OS, programming language and network can interoperate with a CORBA based program from same or different vendor Useful at server side to handle multiple different clients
Three tier architecture
Transcoding Middleware
Used to transcode one format of data to another format to suit the need of
client, device
E.g. to access a web site through mobile phone supporting WAP, we need to transcode HTML page to WML page so that the mobile phone can access it Accessing a map through PDA Used for content adaptation which is also required for meeting network bandwidth needs ICAP (Internet Content Adaption Protocol)
Three tier architecture
Data (Tier -3)
Used to store data needed by application and acts as a repository for both
temporary and permanent data
Database can be any sophisticated relational database, legacy hierarchical database or simple text files Data can be stored in simple XML format for interoperability with other systems and data sources Database middleware (data connectors) runs between the application program and database E.g. ODBC, JDBC
Design Consideration for Mobile Computing
The mobile computing environment needs to be contextindependent as well as context-sensitive.
Information related to surrounding environment of an actor is
called Context Information.
Context means, all the information that helps determine the
state of an object (actor)
Object can be a person, a device, a place, a physical object, surrounding environment.
Context data is captured and decision can be made about how
to adapt content or behavior to suit the context
Design Consideration for Mobile Computing
Ways in which content and behavior should be adapted are with context awareness
1. Content
Build each application with context awareness
Different services for different client context (devices) E.g. For mobile banking application through
Internet (http://www.mybank.com/inet.html) PDA (http://www.mybank.com/palm.heml) Mobile phone using WAP (http://www.mybank.com/wap.wml)
User will use computer to access service through Internet-big web pages, drop down menus, advertisement for new schemes For PDA device, the screen will be small-no product animation For WAP service, the completely different interface
Design Consideration for Mobile Computing
2.
Content switch on context
Provide intelligence for adaption of content within service
Adaptation is transparent to user
Service is same for Internet, PDA, WAP All access to bank will use same site (http://www.mybank.com) An intelligent piece of code identifies the agent device or context 3.
Content transcoding on context
Provide middleware platform that performs the adaption of the content based on the context and behavior of the device Adaptation is transparent to client and application middleware identifies the context either from the HTTP or other parameters Middleware transcodes the code from html(or xml) to html and wml on fly
Design Consideration for Mobile Computing
2.
Fig. 2.5
Design Consideration for Mobile Computing
Client Context Manager
Mobile computing application needs to operate in dynamic conditions Various device characteristics and network condition Mobile environment demands a reactive platform that can make decisions about how to respond to changes to device capability, user preferences, enterprise policy, network policy and many other environmental factors Context can be used as the basis by which an adaptation manager or algorithm decides to modify content or application behavior Thus we need Client context manager to gather and maintain information
pertaining to the client device, user, network and environment surrounding
each mobile device. These information will be provided by a set of Awareness Modules
Design Consideration for Mobile Computing
Client Context Manager(Cont..)
Awareness Modules are sensors of various kinds (Hardware/Software) Hardware sensors can be used to identify the precise location of a user
Software sensors can be used to determine the type of user agent
These awareness modules can be in the device, network or even in the middleware Some of context information
Identity Spatial Information : related to location, space, speed, acceleration Temporal Information :time of the day, date, time zone , season of the year Environment Information :temperature, humidity, speed of wind, moisture, natural light Social Situation : whether user in meeting/ party Resources that are nearby :accessible resources, hosts or other information sinks Availability of resources : battery power, processing power, display, I/O capacity, bandwidth Physiological measurements : blood pressure, heart rate, muscle activity
Design Consideration for Mobile Computing
Client Context Manager(Cont..)
A system is Context-aware if it can extract, interpret and use context-related information to adapt its functionality to the current context To extract information, application software must include some intelligence to process information and deduce the meaning. Three major aspects of context management
Context Sensing : The way in which context data is obtained Context representation : The way in which context information is stored and transported Context interpretation : The way in which meaning is obtained from the context represe4ntation
W3C has proposed a standard for context information called CC/PP
(Composite Capability / Preference Profiles) for device capability description and user preferences
Design Consideration for Mobile Computing
CC/PP
Proposed W3C standard specially for wireless devices (mobiles / PDAs) CC/PP is based on RDF (Resource Description Framework) and is coded in XML CC/PP profile contains a number of attribute names and associated values that are used by an application to determine the appropriate form of a resource to
deliver to a client
This helps the client to describe its capabilities to origin server and other sender of data Simple steps followed by server to use CC/PP profile
Device sends serialized profile model with request for content
Origin server receives RDF profile and converts it into an in-memory model (Document model) The profile for the requested document is retrieved and an in-memory is created (Device profile model) The device profile model is matched against the document profile model A suitable representation of the document is chosen or dynamically generated Document is returned to device and presented
Design Consideration for Mobile Computing
Policy Manager
It specifies rules for adaptation when a user is at certain location, regardless of the information provided in an application or document profile A policy is a set of rules needs to be followed under certain conditions Policy manager will be able to define policy for documents / services and assign roles to users Each role will have permissions, prohibitions and obligations associated with it Each policy will have access rights associated with respect to read, write and execute A policy with role and current context information will be able to determine what actions a user is allowed to perform, or what actions a user is obliged to perform
Design Consideration for Mobile Computing
Semantic Web
Policies are set of rules. Semantic web is useful to make machine understand policies and behave in expected fashion Data in the Web is generally hidden away in HTML files Some contents are useful in some context but not all context
Semantic web is targeted to provide facilities to put machine understandable data on web
not just for display, but for automation, security, filtering , integration and reuse of data across various application Large number of semantic web applications - variety of different tasks- increasing the
modularity of applications on the web
Semantic Web is built on syntaxes which use URI (Uniform Resource Identifier) to represent data, usually in tuple-based structures Many tuples of URI data that can be held in databases or interchanged on the WWW using
a set of syntaxes developed for tasks
Design Consideration for Mobile Computing
Security Manager
Provides a secure connection between the client device and the original server Security policies Confidentiality : Nobody will be able to see the message (Encryption) Integrity : Nobody will be able to change the content (Hashing) Availability : Nobody will be able to stop the service (Web Server, Firewall) Non-repudiation : Nobody after using the system can claim otherwise (Digital Signature) Trust : Complex issues of knowing what resources, services and agents to trust. The system will be trusted (Trusted Third Party)
Design Consideration for Mobile Computing
Platform for Privacy Preference Projects (P3P)
Standard defined by W3C Enables web sites to express their privacy practices in a standardized format so that can be retrieved and interpreted by user agents Key information about the content f the web site can be conveyed to the user Any discrepancies between a sites practices and the uses preferences can be flagged as
well
The goal is to increase user trust and confidence in the web Provides a technical mechanism to inform users about privacy policies about the site To help the users to decide whether to release personal information or not P3P does not provide any mechanism for ensuring that sites act according to their policies
Design Consideration for Mobile Computing
Adaptability Manager
Responsible for adapting content, behavior, and other aspects according to context and policy May take actions depending on the information passed to it by context manager They providing transcoding of content so that it may be viewed on a particular device Appends location specific information to documents
Content Adaption and Transcoding
In ubiquitous situation, Content should be able to adapt to dynamic situations Adaptation may be static or dynamic Content adaption can be performed either at the content level at the server or at the agent in the client device It can be done at middle layer through middleware software
Design Consideration for Mobile Computing
Content Adaption and Transcoding (Cont..)
Content adaptation needs to consider the following attributes
Physical capabilities of the device
Logical capabilities of the device Effective network bandwidth Payload
Transcoding can be classified as
Spatial : transcoding in space/ dimension. Standard frame is downscaled and reduced Temporal : Reduction of number of frames in the time scale Color : For monochrome clients Code : Changes coding from one standard to another Object or semantic : Extract objects and transfer them with low compression to maintain both details and speed
Design Consideration for Mobile Computing
Content Adaption and Transcoding (Cont..)
Server side content adaptation InfoPyramid
InfoPyramid creates context-aware content through static transcoding
Transcoding is done off-line at the content creation time Each atomic item of the document is analyzed to determine its resource requirement The resource requirement is determined by the following attributes Static content size in bits Display size such as height, width and area Streaming bit-rate Color requirement Compression formats Hardware requirements
Design Consideration for Mobile Computing
Content Adaption and Transcoding (Cont..)
Client side content adaptation Done by agent application based on its
capabilities
Can be quite effective for static images Not very effective for streaming payload delivery Content adaptation at Middleware provides transparent service to device and content Main drawbacks Content providers do not have control over how their content will appear to
client device
HTML tags mainly provide formatting information rather than semantic information Transcoding could be difficult to apply to many media such as video and audio
Design Consideration for Mobile Computing
Content Rating and Filtering
Provides more discipline environment in electronics world
W3C proposed a standard PICS (Platform for Internet Content Selection) for
rating of web content
Depending upon rating, filtering of contents will take place PICS specification is a set of technical specifications for labels (meta-data) that help software and rating service to work together
Rating and labeling service chooses their own criteria for proper identification and filtering of contents
Generally, service provides defines rating
Rating can be self-rating or third party labeling of content In third party labeling, independent rating agency
Design Consideration for Mobile Computing
Content Rating and Filtering (cont..)
PICS is a general meta-data system, meaning that labels can provide any
kind of descriptive information about Internet material
The main aim of PICS is to use meta for Digital Signature : Coupling the ability to make assertion with a cryptographic block Intellectual Property Rights Management : Using meta data system to label Web resources with respect to their authors, owners and right managements information Privacy : Using meta-data system to allow sites to make assertion about their privacy practices and for users to express their preferences for the type of interaction they want to have with those sites Personalization : Based on some policy, the content can be personalized to
suit the need of the user and the service
Design Consideration for Mobile Computing
Seamless Communication
Ubiquitous system will be available and accessible from anywhere, anytime
and through any network and even during moving
Seamless communication combines seamless handoffs and seamless roaming Handoff is the process by which the connection to the network is moved from one base station (access point) to another base station within the same network Roaming will involve the point of attachment moving from one base station of one network to another base station of another network Handoff should work while a session is in progress Seamless communication offers users freedom to roam across different wireless networks True seamless roaming will include handoff and roaming in a heterogeneous
hybrid network
Design Consideration for Mobile Computing
Seamless Communication (Cont..)
In seamless roaming, the following aspects need to be maintained and
managed in a seamless fashion without any disruption of service
Authentication across network of boundaries Authorization across network boundaries Billing and charging data collection End-to-end data security across roaming Handoff between wireless access points Roaming between networks
Session migration
IP mobility
Design Consideration for Mobile Computing
Autonomous Computing
The purpose of autonomous system is to free users and system administrators from the details of system operation and maintenance complexity. The essence of autonomous system is self-management, which is a combination of the following function
Self-configurable : System will configure itself automatically in accordance with highlevel policies Self-optimizing : System will continuously look for ways to improve its operation with respect to resource, cost and performance Self-healing : System will detect , diagnose and repair localized problems resulting from bugs or failure Self-protecting : System will defend itself from external attacks and will not propagate and cascade failure to other parts of the system Self-upgradable : System will be able to grow and upgrade itself within the control of the above properties
Context Aware Systems
A system is Context-aware if it can extract, interpret and use context-related information to adapt its functionality to the current context
Context manager has to collect information about location, mobile device, network, users , environment and any other context information
Location information
Helps us to identify the location of the user/device Collect through the device or through network From device : Find location through GPS(Global Positioning Systems) From Network : device can be determined through timing advance technology which relates to the successful call
Context Aware Systems
Device information
Helps us to know the characteristics of the device Required to determine the resource capability and user interface capability Collect through the device or through network Through user agent parameter of HTTP protocol gives device information From network side, information can be obtained from EIR (Equipment Identity Register) database of the network
Network information
User moves from network to network, even in heterogeneous environment Network information is required to identify the capability of the network This information includes security infrastructures, services offered by the network
Context Aware Systems
User Information
It is required to identify the user correctly From security point, whether user is authorized or not Need to ensure that nobody else is impersonating For charging the user properly we need to refer to some subscriber information available in the network
Environment Information
The temperature, elevation, moisture and other ambient-related information
Making existing applications Mobile-enabled
The ways by which applications made ubiquitous and mobile computing capable
Enhance existing application Rent an application from ISP Write a new application Buy a packaged solution Bridge the gap through middleware