Monday, June 3, 2019
Types Of Mobility For Mobile Computing Computer Science Essay
Types Of Mobility For Mobile Computing Computer Science EssayThe inducement in last 20 years in the field of telecommunication and the integration of telecommunication with internet has promised pervasive computation infrastructure. These pervasive systems allow users to access their development on the internet irrespective of their location. In addition, the advancement in devices miniaturization increases the number of portable devices connect to the internet corresponding smooth phone, laptops, palmtops net books, PDAs, etc. In these scenarios we can consider antithetic types of mobility. User mobility, Terminal mobility, Mobile access to imagerys. User mobility requires providing users with a uniform view of their preferred working environments user taste perceptions and subscribed serveindependent of their on-line(prenominal) positions in the communicate.1 Terminal mobility allows devices to transpargonntly move and connect to distinct points of attachment.1 Mobile ac cess is an emerging issue that involves the dynamic adaptation of runny-aw be resources and operate that mobile users and terminals can automati shrieky retrieve regardless of their current location.1Having considered the above types of mobility, mobile computing needs an advanced infrastructure which should dynamically pursue and relocate mobile users and grant coordination between mobile entities. The infrastructure should excessively provide proper aegis level base on cryptographic mechanisms and tools. gibe to the given research paper three mobile computing services puzzle been proposed user virtual environment (UVE),mobile virtual terminal (MVT), and virtual resource management (VRM).UVE provides users with a uniform view of their working environments independent of current locations and specific terminals. MVT extends traditional terminal mobility by preserving the terminal execution state for indemnification at new locations, including active processes and subscribed services. VRM consents mobile users and terminals to maintain access to resources and services by automatically requalifying the bindings and moving specific resources or services to permit load balancing and replication.1 word form-BASED MIDDLEWARESOMA stands for Secure and Open Mobile Agent. SOMA is a service infrastructure for developing and implementing MA-based internet applications. SOMA lie of 4 layers. As shown in figure 1Figure 1 http//www-lia.deis.unibo.it/Software/MA/Images/Mobile1.jpgThe upper close layer is for mobility support which provides UVE (User virtual(prenominal) Environment), MVT(Mobile Virtual Terminal), VRM(Virtual Resource Management). The next layer provides naming, security, migration, interoperability, persistence, communication and Quality of Service. The early(a) two layers are a JVM (JAVA Virtual Machine) and a heterogeneous distributed system.SOMA is basically a JAVA based mobile divisor which has been designed to provide the requirements of mo bility, scalability, dynamicity, security and openness which are the typical issues in the internet scenarios. The two main goals to develop SOMA were interoperability and security. On one side, SOMA is based on detailed security model and provide a good range of mechanisms and tools to develop and carry out true security policies with flexibility. On the other side, SOMA is able to communicate and interact with different components of applications which are designed with different programming languages and platforms. Apart from interoperability and security features, SOMA is automatically and dynamically manageable and configurable and it provides the location abstraction to achieve scalability in a orbiculate scenario.The mobility of the mobile devices has introduced new security challenges like mobile can be hacked by the execution of malicious environment, may be cloned illegally to cause DoS (denial of service), or may be denial for roaming. These issues have been overcome i n SOMA implementation as SOMA permits to protect both agents come from malicious hosts and hosts from malicious agents. During the design and implementation of SOMA, number of challenges were face up to provide interoperability like SOMA application as server of COBRA, SOMA as COBRA clients, interoperability between COBRA components and SOMA, etc On the other book, SOMA is a bit silent because of its extra security mechanisms, it involves different tools and techniques to provide more than security which compels it slow as compare to other mobile agents but off course it is more secure than other mobile agents. As the name suggest secure and open mobile agent, its openness has introduced some more challenges to it especially for e-commerce applications so at that place is a need to improve it as nothing is perfect.Q2All the MA(Mobile Agent) standards seem to be a promising platforms for implementing and developing applications in distributed, heterogeneous and open environment s like the Internet. MAs try to overcome most of the limits of the conventional Client/Server model because of the basic features they have, much(prenominal) as autonomy and flexibility and can effortlessly flux with the internet to extend accessibility of applications. Most of the application areas, like e-commerce, network management, mobile computing and nurture retrieval can benefit from the use of the mobile agent technology. There has been a lot of work done in this field. Like many mobile applications have been developed like we studies SOMA, there are some other application as well like SeMoA, Aglets, fraglets, etc. There are some advantages which all the mobile agents try to provide fighting(a) adaptation, flexibility, tolerance to network errors/faults, parallel processing, etc. Dynamic adaptation is the adaptation of the different host environments. Tolerance to network faults means ability of mobile agent to operate without an active connection between server and cli ent. Flexibility means to only source must be updated whilst changing an action of the agent. Comparing SOMA with other mobile agents, SOMA provides more security and openness as its name says.If we talk about SeMoA (Secure Mobile Agent) it has its own limitations, such as SeMoA is not very strong against a large number of Denial of Service (DoS) attacks like memory exhaustion. On the other hand SOMA has been designed taking into account security as a main property because SOMA protects both agents come from malicious hosts and hosts from malicious agents. another(prenominal) problem with SeMoA is that there are many classes in the core package that synchronize on the object of class itself. As local classes are shared and the visibility of local classes is global so any agent that access them and acquires a lock on such class objects blocks other threads to access them. On the other hand if we compare SOMA with fraglets which is very small computer program which has been designed to serve as a part of active network instead of a mobile agent. Fraglets have the ability to execute the codes on the path the travel by such as routers or hubs.Part 2Q1.Pervasive computing is a ideate of personal computing where future living environments are saturated with non-intrusive, flawlessly operate services available for the user. To fully understand this dream these services are to adapt to the present situation of the environments, together with the economical/social situation of the user. Systems that use data about the state of either its system, users or the environment to settle in their behavior are called context of use-aware systems. Realizing context-awareness has introduced problems on different level First, defining a context. Second, how and what can be adjusted when the context changes and where the context adaptation and definition comes from? Third, identify different contexts from sensor. Fourth, how a context can be represented and processed. But bef ore that we have to understand the definition of context. The most cited definition of context by Dey is Context is any information that can be used to characterize the situation of an entity. An entity is a person, place, or object that is considered applicable to the interaction between a user and an application, including the user and applications themselves.1RepresentationUnique IdentifiersThe system should be able to recognize different type of contexts and environments in the legitimate world. Uniqueness allow the reuse of that information without conflicting between identifiers. For example, If the user is driving a car so accelerometer can be used to hear the speed of the user.ValidationValidation should always be allowed for an information taken by the sensor before performing any action with it. For example, if the accelerometer indicates that the speed of user is fast (i.e. he/she is in the car) this does not mean that he/she is driving, this information should be vali dated before performing any action. For instance consider the precondition that if I am driving I cannot answer the calls so reject the call and spread a message saying I will call you later. But if I am in the car but I am not driving than I can answer the calls so the information from the accelerometer has to be validated before rejecting the calls.Uncertainty and incomplete informationAs almost all of the context information of the real world is taken from the sensors, the information can be incomplete and uncertain. If we include reasoning uncertainty of the conclusions should follow the reasoning.Simplicity, reuse, and expandabilityA system should supply only as expressive pattern as necessary to maintain the domain knowledge. A simple representation endorse reuse and expandability. Simplicity, flexibility and expandability are among the requirements of context representation.GeneralityGenerality of context representation means the ability to support all types of context inf ormation. In my estimation, generality of a context representation is mostly described by its conceptual structure. Nevertheless, the clarity of a representation language which is used to generate the context information also vary its ability to generate context information at different levels of complexity.Q2.IntroductionWAP (wireless application protocol) is a protocol to offer mobile data services. WAP is an open international standard that permits users to access global information instantly by dint of any wireless device mobile phone, PDA, etc. WAP is normally supported by all operating systems. Browsers that uses WAP are called micro-browser. The rate of transfer of data is take over very lower than the normal modem. On the other hand, I-mode is a complete mobile internet service that includes a large range of internet standards such as e-mail, sports results, weather forecast, news headlines, etc. This information is provided to the user by particular services from mobile carriers who charge them for these services. As the rate of transfer of the data is lower than the average modem, i-mode is not good enough for high resolution images and videos, it is basically sufficient for simple graphics and emails.ProtocolsWAP uses Wireless Markup Language (WML) for communication. while on the other hand i-Mode uses a different type of HTML which is called compact HTML (c-HTML).Capabilities of DevicesWAP devices have to have a specific WAP browser while i-Mode supporting(a) devices have to be able to display data from c-HTML. WAP capable devices show only textual information while i-Mode supporting devices shows multimedia images. WAP gives navigation among work menus while i-Mode gives navigation via hyperlinks.ArchitectureWAP makes use of a unique language called WML (Wireless Markup Language) for interaction between a specific protocol translation device called a Gateway of WAP (GW) and information on the Internet. The GW communicates between HTML and WML , permits supply of WAP content to a WAP supporting device. iMode obeys a dissimilar approach to allow users to access IP-based services via their portable device. i-MODE is uses packet data transmission technology, a machine using this technology is continuously online. The transfer of the data makes use of the CDMA (Code Division Multiple Access). artistic creationOne of the most main difference that appears, are clearly the dissimilar graphic capabilities. While it is right that i-MODE only allows simple graphics, that is much more than WAP.ChargesAnother main dissimilarity is the capability of being always-on in i-MODE. As consumer are not charged for how long they serve online, it doesnt seem more suitable, but also less expensive than have to pay for the time they spent online. As it is not needed that dial-up before using the a variety of services based on IP, E-mail has become an SMS (Short Message Service).Part 3Q1.In CCA the InfoStations system is an infrastructural system concept offering many time, many-where access to wireless data services sustaining the portable communication process. This concept enables a variety of classes of portable devices to communicate with each other and with a large number of servers. Intelligent agents operating in the portable device users domain (Personal Assistants-PAs) and the InfoStations help to facilitate a contextualized and personalized environment for the system users. System functionality is offered as a set of bendable mobile services. To assist the personalization of these services, the User Agent Profile (UAProf) and Composite Capabilities/Preference Profile (CC/PP) terms are derived to enable thePersonal Assistants express capability and preference information (CPI) about both the access device and the user as well. This makes sure that the offered services are adapted to suit the device capabilities, wireless network constraints and the user as well.Behavior of infoStationBecause of the fact that natu re of the connection is defused, it is important for intelligent agents to work throughout the architecture. Being a PA (Personal Assistant), the agent may function automatically in order to convince any user service needs they encounter, while in or out of interaction with other agents which are working on InfoStation Centre or the InfoStation. The service sessions may be divided between different InfoStations, the personal suspensor can make a service call while within the scope of an InfoStation, and then go out of the coverage area. During this time when the user goes out from InfoStation coverage, the personal assistant functions automatically adopt the functionality of the service till the user has completed the task. The InfoStations houses the Discovery, Presentation and Rendering Self-Service module, which is used to establish connections to mobile devices which enter within range. in any case housed is a cache of recently accessed user and service profiles, as well as a repository of available services.4Q2Behavior of infoStation CentreThe InfoStation Centre stands at the centre of the system, which deals with the formation and updating of contents/objects throughout the system. From InfoStation Centre which acts as a central point, service updates can be spread across the satisfying system. All the infoStations are connected with the InfoStation centre which acts as a server of these infoStations. InfoStation centre is aware of all the devices connected to the infoStations but it communicates with infoStations only, it does not communicate outright to the devices connected to the infoStations. For instance a mobile device wants to communicate with the other mobile device connected with different InfoStation then the device will send a request to its InfoStation then the InfoStation send this request to InfoStation Centre and then InfoStation centre sends the request to the InfoStation to which the receiver device is connected with.Q3Bob Alice .0 Alice Bob ( howdy ).0 - Alice hello hello Q4BobAlice.0 AliceBob (hello).0 Q6BobAlice.0 AliceBob (hello).0 IS1in IS4.out.0 IS40 IS4in IS2.out.0
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.