Mobile Computing Notes
Mobile Computing Notes
Mobile Computing Notes
1
ARPS funded different research projects to help conduct research in computer networks laid
the foundation of packet switched data networks.
The important packet switched networks in US and Europe are TCP/IP and X.25
TCP/IP was driven by education and defense in the US whereas X.25 was driven by European
telecommunication industry and governments.
With the evolution of computers and packet switched networks, movements of bits and bytes
progressed to a new state of maturity.
The first step towards the convergence between telecommunication and IT happened in 1965
when AT&T used computers to do the switching in an electronic switching system(ESS).
The World Wide Web (WWW) was started by Tim Berners-Lee in 1989 as a text processing
software, brought these two faculties of technology together and establish Internet as a powerful
media.
The internet meets four primary needs of the society
Communication
Knowledge sharing
Commerce
Entertainment
This convergence is called Information and Communications Technologies (ICT).
ICT will address the need to access data, information and knowledge from anywhere , anytime.
In 1947 researchers in AT&T Bell Labs conceived the idea of cellular phones.
They realized that by using small service areas or cells they can reuse the frequency.
This in turn can enhance the traffic capacity of mobile phones.
AT&T requested the Federal Communication Commission (FCC) to allocate a large number
of radio-spectrum frequencies so that widespread mobile telephone services would become
feasible.
FCC is a government agency in the US that regulates the usage and licensing of frequency
bands, every country has its regulatory agencies like FCC.
In India the regulatory authority is Telecom Regulatory Authority of India (TRAI).
2
EVOLUTION OF WIRELESS NETWORKS:
The first wireless network was commissioned in Germany in 1958 is called A-Netz and uses
analog technology at 160MHz.
Only outgoing calls were possible in this network.
This system evolved into B-Netz operating at the same 160MHz, was possible to receive an
incoming call from a fixed telephone network, provided that location of the mobile station was
known.
In April 1973, Martin Cooper of Motorola invented the first mobile phone handset.
In 1977 AT&T and Bell Labs constructed a prototype of a public cellular network.
In 1982 the Conference of European Posts and Telegraphs (CEPT) formed a study group
called the Groupe Special Mobile(GSM) to develop a standard for the pan-European mobile
system.
In 1989 , GSM responsibility was transferred to the European Telecommunication Standards
Institute(ETSI) and GSM became a technical committee within ETSI.
In 1990 Phase I of the GSM specification were published.
GSM has become popular outside Europe, therefore to give a global flavour, GSM was
renamed as “Global System for Mobile Communications”.
Enhanced 2G
2.5G Higher Data Rates
GPRS,EDGE
Enhanced 3G/Interoperability
3 Protocol
4G High speed & IP-based
4G, Mobile IP
MOBILE COMPUTINNG
Mobile Computing is a technology that allows transmission of data, voice and video via a
computer or any other wireless enabled device without having to be connected to a fixed
physical link.
Mobile computing is used in different contexts with different names.
The most common names are
Anywhere, Anytime Information
Virtual Home Environment
Nomadic Computing
Pervasive Computing
Ubiquitous Computing
Global Service Portability
Wearable Computers
4
with set top box, palmtop computers, pocket PCs, two way pagers, handheld
terminals etc.
Network: Whenever a user is mobile, he will be using different networks at
different places at different time eg GSM, CDMA, iMode, Ethernet, Wireless
LAN, and Bluetooth etc.
Gateways: This is required to interface different transport bearers. These
gateways convert one specific transport bearer to another transport bearer.
Example: From a fixed phone (with voice interface) we access a
service by pressing different keys on the telephone.
These keys generate DTMF (Dual Tone Multi Frequency) signals.
These analog signals are converted into digital data by Interactive
Voice Response (IVR) gateway to interface with a computer
application.
Other Examples will be WAP Gateway, SMS Gateway etc.
MiddleWare: This is more of a function rather than a separate visible node. In the
present context middleware handles the presentation and rendering of the
context on a particular device. It will also handle the security and
personalization for different users.
Content: This is the domain where the origin server and content is .
This could be an application, system or even an aggregation of systems.
The content can be mass market, personal or corporate content.
Origin Server will have some means to accessing the database and the
storage devices.
APPLICATION SERVER
ORIGIN
DEVICE ADAPTATION DATASTORE
SERVER
FRAMEWORK
MIDDLEWARE FRAMEWORK
USER WITH NETWORKS CONTENT
DEVICE AND
GATEWAYS 5
DIALOGUE CONTROL
In any communication there are two types of user dialogues.
long session-oriented transactions and
short transaction.
Going through a monolithic document page by page can be considered as a session-oriented
transaction.
Going to a particular page directly through an index can be considered as a short transaction.
Selection of the transaction mode will depend on the type of device we use.
A session may be helpful in case of services offered through computers with large screens and
mouse.
For devices with limited input/ output like SMS for instance, short transactions may be desired.
Let us consider an example of bank balance enquiry over the Internet.
In case of Internet banking through desktop computer, the user has to go through the following
minimum dialogues:
1.Enter the URL of the bank site.
2.Enter the account number/password and Login into the application.
3.Select the balance enquiry dialogue and see the balance.
4.Logout from the internet banking.
The dialogue above is an example of session-oriented transaction.
Using short transaction, the same objective can be met through one single dialogue.
NETWORKS
WIRELINE NETWORKS:
6
Wireline networks are generally public networks and cover wide areas.
When we connect to Internet Service Providers(ISP), its generally a wireline network.
The Internet backbone is a wireline network as well.
WIRELESS NETWORKS:
Ad Hoc NETWORKS:
"Ad Hoc" is actually a Latin phrase that means "for this purpose."
It is often used to describe solutions that are developed on-the-fly for a specific purpose.
For example, if you need to transfer a file to your friend's laptop, you might create an ad hoc
network between your computer and his laptop to transfer the file.
This may be done using an Ethernet crossover cable, or the computers' wireless cards to
communicate with each other.
If you need to share files with more than one computer, you could set up a mutli-hop ad hoc
network, which can transfer data over multiple nodes.
Basically, an ad hoc network is a temporary network connection created for a specific purpose
(such as transferring data from one computer to another).
If the network is set up for a longer period of time, it is just a plain old local area network
(LAN).
7
BEARERS:
For different type of networks, there are different types of transport bearers.
These can be TCP/IP , HTTP, protocols or dial-up connection.
For GSM it could be SMS, USSD (Unstructured Supplementary Service Data) or WAP.
For mobile or fixed phone, it will be Voice.
Any software layered between a user application and operating system can be termed as
middleware.
Middleware examples are
communication middleware,
object oriented middleware,
message oriented middleware,
transaction processing middleware,
database middleware,
behavior management middleware,
RPC middleware etc.
There are some middleware components like behavior management middleware, which can
be a layer between the client device and the application.
In mobile computing context we need different types of middleware components and gateways
at different layers of the architecture (Figure 1).
8
These are:
1. Communication middleware
4. Communication gateways.
COMMUNICATION MIDDLEWARE:
The application will communicate with different nodes and services through different
communication middleware.
Examples could be TN3270 for IBM mainframe services, or Javamail connector for IMAP or
POP3 services
For a session we need to maintain a state over the stateless Internet is done through an
application server.
The user may be using a device, which demands a short transaction whereas the service at
the backend offers a SoD.
In such cases a separate middleware component will be required to convert a SoD to a short
transaction.
We can have applications, which are developed specially for different types of rendering.
For example, we can have one application for Web, another for WAP, and a different one for
SMS.
9
On the contrary, we may choose to have a middleware, which will manage entire device
specific rendering at the run time.
This middleware will identify the device properly and handle all the behavior related stuff
independent of the application.
COMMUNICATION GATEWAYS:
Between the device and the middleware there will be network of networks.
Gateways are deployed when there are different transport bearers or networks with dissimilar
protocols.
For example, we need an IVR (Interactive Voice Response) gateway to interface voice with a
computer, or an WAP gateway to access internet over a mobile phone.
11
GPS BASED SYSTEMS: Applications related to location tracking come under this
category.
e-Governance: These applications are very important to bridge the digital divide.
The Bhoomi project in Karnataka government has computerized two crore
land records of 67lakh farmers living in 30,000 village in the state.
Many such projects in the Government can be made electronic, resulting into
better and faster access to information managed by the government.
VIRTUAL LABORATORIES: There are many labs and knowledge repositories
around the world.
These types of applications make the facility of these labs available across the
boundary of culture and countries.
COMMUNITY FORUMS: There are different social and community meetings.
On making them electronic, it may help increase the involvement of more
people to participate in community developments.
JB FACILITATOR: These could be either proactive alerts or information related to
jobs.
DOWNLOADS: Different types of downloads starting from ringing tone to pictures are
part of this family.
12
One way is to build applications without any context or behaviour awareness.
Context and behaviour adaption will be handled by a behaviour management middleware at
runtime.
Another option is to build different applications specific to different context and behaviour
patterns.
Complexities involve in making an existing application mobile versus developing a new
mobile system will be different.
For a new application it is possible to embed the behaviour with the application.
However for a long-life system or a legacy application the content behaviour adaptation will
need to be done externally.
Lets us assume that in a bank, some new applications need to be build for e-commerce.
The bank wants to offer banking through Voice (telephone) and Web (Internet).
Assuming that the bank already has a computerized system in place, the bank will develop two
new applications.
One will handle the telephone interface through Interactive Voice Response (IVR) and the
other through Web.
If the bank decides to offer SMS and WAP, they will develop two new applications to support
SMS and WAP interfaces respectively.
To protect the investment and quick adaptation, the bank may decide to use transaction
processing middleware and RPC middleware.
All these are possible only if it is a fresh applications development.
13
SECURITY IN MOBILE COMPUTING:
Mobile computing has its fair share of security concerns as any other technology.
Due to its nomadic nature, it's not easy to monitor the proper usage.
Users might have different intentions on how to utilize this privilege.
Improper and unethical practices such as hacking, industrial espionage, pirating, online fraud
and malicious destruction are some but few of the problems experienced by mobile computing.
Another big problem plaguing mobile computing is credential verification.
As other users share username and passwords, it poses as a major threat to security.
This being a very sensitive issue, most companies are very reluctant to implement mobile
computing to the dangers of misrepresentation.
The problem of identity theft is very difficult to contain or eradicate.
Issues with unauthorized access to data and information by hackers, is also an enormous
problem.
Outsiders gain access to steal vital data from companies, which is a major hindrance in rolling
out mobile computing services.
No company wants to lay open their secrets to hackers and other intruders, who will in turn sell
the valuable information to their competitors.
It's also important to take the necessary precautions to minimize these threats from taking place.
Some of those measures include −
Hiring qualified personnel.
Installing security hardware and software.
Educating the users on proper mobile computing ethics.
Auditing and developing sound, effective policies to govern mobile
computing.
Enforcing proper access rights and permissions.
There are many institutes that generate and provide standards across the world.
There are standard bodies at the regional, country as well as international level.
Standard bodies are formed by the governments, professional institutes or industry
consortiums.
There is a standard body under the Govt of India which is called Bureau of Indian Standard or
simply BIS.
A standard process include the following steps:
Consensus on a proposed standard by a group or “consensus body” that includes
representatives from materially affected and interested parties.
Board-based public review and comments on draft standards.
Consideration of and response to the comments submitted by voting members of the
relevant consensus body and by public review commenters.
Incorporation of approved changes in a draft standard.
Right to appeal by any participant who believes that due process principles were not
sufficiently respected during the standards development in accordance with the ANSI
accredited procedures of the standards developer.
Standards bodies:
Groups that are a government accredited organization and immune to prosecution for collusion
(as long as they obey their rules).
They have an open, formal process for membership, require their membership to share relevant
patents on a fair, reasonable and non-discriminatory basis.
15
ISO (International Organization for Standardization):
16
ETSI guidelines are voluntary and almost always comply with standards produced by
international bodies.
ETSI initiatives touch on the following areas: aeronautical radio, API, ATM, electromagnetic
compatibility, electronic signature, Generic Addressing and Transport protocol, maritime radio,
service provider access, Telecommunications Management Network (TMN), TETRA, VoIP,
and xDSL.
OMA (Open Mobile Alliance):
The Open Mobile Alliance (OMA) is a a mobile specification resource organization.
The OMA facilitates mobile service interoperability worldwide while growing the mobile
market through the rapid adoption of mobile data, entertainment and communication standards.
OMA membership includes approximately 200 organizations, including mobile operators,
device/network suppliers, IT organizations and content providers.
A key OMA benefit is efficient resolution of issues related to mobile service interoperability.
Solutions are based on open standards that deliver economic benefits.
OMA's principles are derived from the Open Mobile Architecture Initiative (OMAI) and
Wireless Application Protocol (WAP), as well as the Mobile Wireless Internet Forum (MWIF),
SyncMLInitiative, MMS Interoperability Group (MMS-IOP), Location Interoperability Forum
(LIF) and Mobile Gaming Interoperability Forum (MGIF).
ITU(International Telecommunication Union):
ITU is an organization within the United Nations System.
It was founded on the principle of cooperation between governments and the private sector.
With a membership encompassing telecommunication policy makers and regulators, network
operators, equipment manufactures, hardware and software developers, regional standards-
making organizations and financing institutions, ITU’s activities, policies and strategic
direction are determined and shaped by the industry it serves.
ITU has three sectors of the Union are Radio communication(ITU-R), Telecommunication
Standardization(ITU-T) and Telecommunication Development(ITU-D).
IEEE Standards Association(IEEE-SA):
IEEE Standards Association (IEEE-SA) is an organization that produces standards, which are
developed and used internationally.
IEEE-SA focuses considerable resources on the long-respected full consensus standards
process carried out by the standards committees and IEEE societies, the IEEE-SA pioneers
new and innovative programs to increase the value of IEEE standards to members, industry
and the global society.
17
EIA(Electronic Industries Alliance):
The Electronic Industries Alliance(EIA) is a national trade organization within the US that
includes the full spectrum of its electronics industry.
The Alliance is a partnership of electronic and high-tech associations and companies whose
mission is promoting the market development and competitiveness of the US high-tech industry
through domestic and international policy efforts.
W3C (World Wide Web Consortium):
World Wide Web Consortium (W3C) develops interoperable technologies to lead the web to its
full potential.
W3C is a forum for information, commerce, communication and collective understanding.
By promoting interoperability and encouraging an open forum for discussion, W3C is commited
to leading the technical evolution of the Web.
3GPP:
3GPP is to produce globally applicable technical specifications and technical reports for 3rd
Generation Mobile System based on evolved GSM core networks and radio access technologies
that they support (i.e) Universal Terrestrial Radio Access (UTRA) both Frequency Division
Duplex(FDD) and Time Division Duplex(TDD)modes.
ANSI(American National Standards Institute):
ANSI is the national standard organization in the United States.
In many instances the US standards are taken forward to ISO and IEC(International
Electrotechnical Commission), where they are adapted in whole or in part as international
standards.
UMTS(Universal Mobile Telecommunications System):
UMTS represents an evolution in terms of services and data speeds from todays second
generation mobile networks like GSM.
As a key member of the global family of third generation(3G) mobile technologies identified by
the ITU, UMTS is the natural evolutionary choice for operators of GSM networks.
BLUETOOTH:
Bluetooth wireless technology is a worldwide specification for a small-form factor, low cost
radio solution that provides links between mobile computers, mobile phones, other portable
handheld devices and connectivity to the Internet.
18
CDG(CDMA Development Group):
The CDMA Development Group(CDG) is an international consortium of companies who have
joined together to lead the adoption and evolution of CDMA(Code Division Multiple Access)
wireless system around the world.
PKCS(Public-Key Cryptography Standards):
The Public-Key Cryptography Standards (PKCS) are specifications produced by RSA
Laboratories in cooperation with secure systems developers worldwide for the purpose of
accelerating the deployment of public-key cryptography.
PAM Forum(Presence and Availability Management Forum):
In the world of ubiquitous computing knowing the position and context of a device is very
I,portant.
PAM Forum is an independent consortium with a goal to accelerate the commercial deployment
of targeted presence and availability applications and services that respect users preferences,
permisisions and privacy.
PARLAY Group:
The Parlay Group is a multi-vendor consortium formed to develop open, technology-
independent application programming interfaces(API’s).
Parlay integrates intelligent network(IN) services with IT applications via a secure, measured
and billable interface.
DECT(Digital Enhanced Cordless communicaTions):
DECT is an ITSI standard for portable phones.
DECT is known in ITU as a 3G system and is commonly referred to as IMT-FT(IMT Frequency
Time).
WiMAX Forum:
WiMAX Forum is Worldwide Interoperability for Microwave Access Forum dedicated to
certifying the operations of interconnecting devices.
It aims to provide wireless data over long distances in different forms ranging from point-to-
point links to full scale mobile access networks for wireless broadband communication.
TTA(Telecommunications Technology Association):
TTA is an IT standards organization catering to development of new standards based in Korea.
It provides one-stop services for comprehensive IT standards.
WiFi:
Wi-Fi owns trademark to Wi-Fi alliance.
19
It was previously known as Wireless Ethernet Compatibility Alliance.
It is focused on interoperability and compatibility of Wireless LAN devices and committed to
continuous improvements in design and better user experience.
ARIB(Association of Radio Industries and Business):
ARIB is an institution based in Japan, dedicated to efficient use of radio spectrum and its
implications in business.
CCSA(China Communication Standards Association):
CCSA is an attempt of Chinese Ministry of IT to reform telecommunications industry and
market
It aims to become a nationally unified standards organization in China.
DLNA(Digital Living Network Alliance):
DLNA ia s cross industry association of consumer electronics, computing industry and mobile
device companies.
The objective of DLNA is to establish a conglomeration of wired and wireless interoperable
network of personal computers , consumer electronics and mobile devices in the home and
outside in order to enable a seamless environment for sharing digital media content.
History of computers and internet
In 1822, Charles Babbage conceptualized and began developing the Difference Engine,
considered to be the first automatic computing machine.
Then after almost a decade, Charles Babbage proposed the first general mechanical computer,
the Analytical Engine. The Analytical Engine contained an Arithmetic Logic Unit (ALU), basic
flow control, and integrated memory concept and is the first general-purpose computer.
In 1946, ENIAC- Electronic Numerical Integrator and Computer was the first electronic
general-purpose computer. It was the first large-scale computer to run at electronic speed
without being slowed by any mechanical parts. And it was invented by J.Presper Eckert and
John W. Mauchly.
Douglas Engelbart invented the first computer mouse.
First computer with RAM – MIT introduces the Whirlwind machine, a revolutionary computer
that was the first digital computer with magnetic core RAM and real-time graphics.
The first minicomputer – In 1960 Digital Equipment Corporation released its first of many
PDP computers the PDP-1.
The first laptop – First Laptop was introduced in 1981 by Adom Osborne and the company
“EPSON” manufactured first Laptop.
20
The following table categorises generations of computers and other important factors associated
with the generations.
HISTORY OF INTERNET:
February 7, 1958 was the day Secretary of Defense Neil McElroy signed Department of Defense
Directive 5105.15.
His signature launched the Advanced Research Projects Agency (ARPA), now known as the
Defense Advanced Research Projects Agency (DARPA).
The creation of the agency is an important moment in science history because it led to the
creation of the internet we recognize today.
21
The Cold War was in full swing in the 1950s, and the US was worried about the Soviet
Union’s growing scientific prowess.
Because of Sputnik 1, launched in 1957, the US military was concerned about the Soviet Union
attacking from space and destroying the US long-distance communications network.
The existing national defense network relied on telephone lines and wires that were susceptible
to damage.
In 1962, J.C.R. Licklider, a scientist from ARPA and MIT, suggested connecting computers to
keep a communications network active in the US in the event of a nuclear attack.
Packet switching made data transmission possible in 1965, and by 1969, military
contractor Bolt, Beranek, and Newman (BBN) developed an early form of routing devices
known as interface message processors (IMPs), which revolutionized data transmission.
22
The Stanford University Network was the first local area network connecting distant
workstations.
In 1981, the NSF expanded ARPAnet to national computer science researchers when it funded
the Computer Science Network (CSNET).
ARPAnet adopted the transmission control protocol (TCP) in1983 and separated out the military
network (MILnet), assigning a subset for public research.
Launched formally as the National Science Foundation Network (NSFNET) in 1985, engineers
designed it to connect university computer science departments iacross the US.
"ARPAnet's transition to the open networking protocols TCP and IP in 1983 accelerated the
already burgeoning spread of internetworking technology," says Stephen Wolff, principal
scientist with Internet2. "
When NSF's fledgling NSFNET adopted the same protocols, ARPAnet technology spread
rapidly not only to university campuses across the USA to support the higher education
community, but also to emergent Internet Service Providers to support commerce and industry."
The NSFNET eventually became a linked resource for the five supercomputing centers across
the US, connecting researchers to regional networks, and then on to nearly 200 subsidiary
networks.
23
NSFNET took on the role of internet backbone across the US, with ARPAnet gradually phased
out in 1990.
Tim Berners-Lee of the European Organization for Nuclear Research (CERN) created the
hypertext transfer protocol (http), a standardization that gave diverse computer platforms the
ability to access the same internet sites.
For this reason, Berners-Lee is widely regarded as the father of the world wide web (www).
The Mosaic web browser, created in 1993 at the National Center for Supercomputing
Applications (NCSA) at the University of Illinois Urbana-Champaign, was a key development
that emerged from the NSFNET.
Mosaic was the first to show images in line with text, and it offered many other graphical user
interface norms we’ve come to expect today (like the browser’s URL address bar and
back/forward/reload options for viewing webpages.)
Eventually the NSFNET modified its acceptable use policy for commercial use, and by 1995, it
was decommissioned.
Soon, the internet provider model created network access points that allowed the for-profit,
commercial side of the internet to be developed.
24
ARCHITECTURE OF MOBILE COMPUTING:
The network centric mobile computing architecture uses three-tier architecture as shown below
26
Example : Message Queue from IBM known as MQ Series.
Transaction Processing(TP) Middleware : It provides tools and an environment for
developing transaction based distributed applications.
An ideal TP system will be able to input data into the system at the point of
information source and the output of the system is delivered at the point of
information sink.
In an ideal TP system , the device for input and output can potentially be
different.
Also the output can be an unsolicited message for a device.
Client
Client
Client Client
Processing Routines
Client
Client
Client
Client
28
1. A user agent makes a request to an ICAP-capable surrogate(ICAP client) for an object
on an origin server.
2. The surrogate sends the request to the ICAP server.
3. The ICAP server executes the ICAP resource’s service on the request and send the
possibly modified request, or a response to the request back to the ICAP client.
4. The surrogate sends the request, possibly different from the original client’s request
to the origin server.
5. The origin server responds to the request.
6. The surrogate sends the reply (from either the ICAP of the origin server) to the client.
4
1
5
6
Client ICAP Client (Surrogate) Origin Server
2 3
DATA (TIER-3):
The Data Tier is used to store data needed by the application and acts as a repository for both
temporary and permanent data.
The data can be stored in any form of database or datastore.
These can range from sophisticated relational database, legacy hierarchical database, to even
simple text files.
29
The data can also be stored in XML format for interoperability with other systems and
datasources.
A legacy application can also be considered as a data source or a document through a
communication middleware.
Database Middleware : It allows the business logic to be independent and transparent of
the database technology and the database vendor.
It runs between the application program and the database.
These are sometimes called database connectors as well.
Examples of such middleware will be ODBC , JDBC , etc.
Using these middleware the application will be able to access
SyncML: SyncML protocol is an emerging standard for synchronization of data access
from different nodes.
The greatest benefit of this model is that resources are managed at a centralized
level.
All the popular mobile devices like handheld computers , mobile phones,
pagers and laptops work in an occasionally connected mode , some data are
cache in the local device and accessed frequently.
Design considerations for mobile computing:
The mobile computing environment needs to be context-independent as well as context-
sensitive.
Context information is the information related to the surrounding environment of an actor in that
environment.
The term “context” means all the information that helps determine the state of an object ( or
actor).
In mobile computing environment , context data is captured so that decision can be made about
how to adapt content or behaviour to suit this context.
There are many ways in which content and behaviour can be adapted.
Following are some examples :
Content with context awareness : Build each application with context awareness.
There are different services for different client context(devices).
Content switch on context: Another way is to provide intelligence for the adaptation of
content within the service.
This adaptation happens transparent to the client.
30
In this case the service is the same for Internet, PDA and WAP.
Content transcoding on context: Another way is to provide an underlying middleware
platform that performs the adaptation of the content based on the context and behaviour
of the device.
This adaptation happens transparent to the client and the application.
The middleware platform is intelligent enough to identify the context either from
the HTTP or additional customized parameters.
In this case the service may be in html or XML, the mddleware platform
transcodes the code from html(or XML) to html and wml on the fly.
Client Context Manager:
Client context manager is needed to gather and maintain information pertaining to the client
device, user, network, and the environment surrounding each mobile device.
All these information will be provided by a set of Awareness Modules.
Awareness modules are sensors of various kinds.
Almost any information available at the time of an interaction can be seen as context
information. Some examples are :
Identity
Spatial information
Temporal information
Environmental information
Social situation
Resources that are nearby
Availability of resources
Physiological measurements
Activity
Schedules and agendas
W3C had proposed a standard for context information.
This standard is called Composite Capabilities/Preference Profile (CC/PP) for describing device
capabilities and user preferences.
31
Higher Level Specification , Applications
C Web Services
Security C P (Architecture SOAP,
Interaction / 3 Choreography,WSDL)
HTML
(XHTML,SVG P P
SMIL,CSS,XFor P
(DSig,Enc,
ms,VoiceXML,SS
KMS)
ML,Timed Text
Multimodality,…) Sematic Web
(RDF,OWL,…)
HTTP
URL XML
(Namespaces, XML Schmas,XSLT,XPath,XLink,XML,Base,XQuery,DOM,…)
HTTP1.1
URI
INITIAL
WEB Tomorrow’s Web
32
CC/PP is designed to suit an adaptation algorithm.
The sequence of steps in the general case would look something like the following
Device sends serialized profile model with request for content.
Origin server receives serialized RDF profile and converts it into an in-
memory model.
The profile for the request document is retrieved and an in-memory model is
created.
The device profile model is matched against the document profile model.
A suitable representation of the document is chosen. At this stage the
document to be returned can be chosen from a number of different version
of the same document or it can be dynamically generated.
Document is returned to device and presented.
33
MOBILE COMPUTING THROUGH INTERNET:
Ubiquitous network can be divided into three functional arears namely core, edge and access.
Out of the three, the core and the edge are likely to be Internet and internet.
By internet we define a network which is a combination of various networks and interworks
with one another, whereas Internet with uppercase I is the Internet we know.
For mobile and ubiquitous computing the access network will be both wirless and wired
networks.
In the case of wireless access network, it could range from infrared, Bluetooth, WiFi,
GSM,GPRS,IS-95,CDMA,etc
For wired it is expected to be some kind of LAN.
In the case of wired network the bandwidth is higher, stable and the device is likely to be a
workstation with a large memory and display.
Also such devices are not constrained by the limited battery power.
When the user-facing device is a wired device, the complexity and challenges are far less.
However some of the constraints for wireless can still apply in the case of wired devices and
networks.
Therefore from the mobile computing client point of view consideration for a wired device
will be the same as a wireless client.
REFERENCE:
MOBILE COMPUTING , ASHOKE K TALUKDER, ROOPA R YAVAGAL, TMH, 2005
ASSIGNMENT TOPIC:
ARCHITECTURE OF MOBILE COMPUTING
QUESTION PAPER:
ONE MARKS:
1.Mobile Phone uses _______.
a) Half Duplex b) Full Duplex c) Both (a) and (b) d) None
2.Which of the following is not a property for Autonomous Computing?
a) Self Protecting b) Self Upgradable c) Self Healing d) Network Information
3.Which of the following is a technology for Modulation ?
a) TDMA b) CDMA c) FDMA d) UMTS
4. ______ protocol is used for communication to access the Internet.
35
a) TCP/IP b) FTP c) SMTP d) UDP
5. _______ is the process of computation in mobile computing.
a) mobile b) system c) networks d) none
6. Mobile Computing is also called as _________.
a) pervasive computing b) distributed computing c) both (a) and (b) d) none
FIVE MARKS:
1. Explain the variants of mobile computing. (NOV 2017)
2. Explain wired network and wireless network. (NOV 2017)
3. Discuss on design consideration for mobile computing. (NOV 2017, APR 2019)
4. Explain Mobility of Bits and Bytes. (APR 2019)
5. Explain any five mobile computing applications. (NOV 2019)
6. What are context aware systems? What are the details that include a context aware system?
(NOV 2019)
EIGHT MARKS:
1. List out and Explain the standard bodies used in mobile computing. (NOV 2017)
2. Explain the three tier architecture of mobile computing. (NOV 2017)
3. How to develop mobile computer application? (APR 2019)
4. Explain the architecture of mobile computing. (APR 2019)
5. List the pros and cons of standards. Name and explain the standard committee responsible for 3G.
(NOV 2019)
6. Explain the various types of network used in mobile computing. (NOV 2019)
36