40 %
60 %
Information about Week13c

Published on April 8, 2008

Author: Teodora

Source: authorstream.com

Slide1:  Software Engineering for Mobility: Yet Another Roadmap Gruia-Catalin Roman, Gian Pietro Picco, Amy L. Murphy Presenter: Somo Banerjee "The future lies in designing and selling computers that people don't realize are computers at all“ Adam Osborne Major trends in Computing:  Major trends in Computing Evolution:  Evolution Computing -------------- Personal Computing - PC Distributed Computing - LAN, WAN, Grid Web Computing - WWW Mobile Computing - PDAs, Cell Phones, SmartPhones Pervasive Computing - !!! Summarizing this Paper – 1:  Summarizing this Paper – 1 Mobile Computing -------------------------- No fixed network structure Nodes may come and go Processes may move among nodes Programs may evolve and change structure Constants are now Variables:  Constants are now Variables Variable Properties ---------------------------------- Location Environment Connectivity Bandwidth I/O devices Security Domain DREAM Environment:  DREAM Environment Issues ----------- Temporary (?) loss of network connectivity Ad-hoc Resource Discovery Scarce Resources Low Battery Power Slow CPU Speed Small amount of Memory Frequent and unannounced changes in the environment DREAMy Devices:  DREAMy Devices Comparison of some mobile devices -------------------------------------------- Requirements for Mobility:  Requirements for Mobility Dynamic Reconfiguration Adaptivity Asynchronous Interaction Context-Awareness Lightweight Middleware Summarizing this Paper - 2:  Summarizing this Paper - 2 Critical Dimensions ---------------------------- Space Coordination Summarizing this Paper - 3:  Space ------- Physical Mobility Logical Mobility Summarizing this Paper - 3 Summarizing this Paper - 4:  Coordination ------------------ Resource Discovery (Extent of) Knowledge about a Resource Synchronization Exchange of Information/Data/Code Summarizing this Paper - 4 Summarizing this Paper - 5:  Summarizing this Paper - 5 Software Engineering ------------------------------- Models Algorithms Summarizing this Paper - 6:  Summarizing this Paper - 6 Models ---------- Unit of mobility Location Context Coordination Mechanism Summarizing this Paper - 7:  Summarizing this Paper - 7 Algorithms ---------------- Control and manage location information of self and neighbors Spatial knowledge Mobile component interaction and communication Connectivity Power Efficiency Summarizing this Paper - 8:  Summarizing this Paper - 8 Systems Research ---------------------- Applications Middleware Summarizing this Paper - 9:  Summarizing this Paper - 9 Applications --------------- Styles of Interaction:  Nomadic interaction Ad-hoc interaction Presence (“Find me”) interaction Styles of Interaction Summarizing this Paper – 10:  Summarizing this Paper – 10 Middleware --------------- Logical Mobility is a design tool Physical Mobility is a requirement A Simple(?) Mobile Application:  A Simple(?) Mobile Application Central DB: e-Shopping Center PC: Belongs to a pair of customers who are also married to each other PDAs: One belonging to each of these two customers E-Shopping System Snapshot Middleware for Mobile Computing:  Middleware for Mobile Computing Transparency or Awareness? ----------------------------------- Replication Context Location Replication:  Replication How to Replicate? When to Replicate? How much to Replicate? Context:  Context Conflict Management Commit Protocol Knowledge about Environment Location:  Location Where? When? Whom? Mobile Middleware Technologies - 1:  Mobile Middleware Technologies - 1 Reflective -- OpenCorba, Open-ORB, DynamicTAO, XMIDDLE Tuple Space -- LIME, TSpaces, JavaSpaces Context-Aware -- Nexus Event-Based -- Hermes Mobile Middleware Technologies - 2:  Mobile Middleware Technologies - 2 Some Viewpoints - 1:  Some Viewpoints - 1 By 2005, the typical cell phone will be indistinguishable from a PDA, and at least one U.S. carrier will support both 802.11 and 2.5G or 3G on the same devices. As an unexpected consequence of this dual-band support, we'll see some instances of bottom-up networks, where devices connect directly with each other on a peer-to-peer basis. This will be a viable alternative to the current monopoly of carriers' antennas. -- John Jordan, principal, office of the chief technologist, Cap Gemini Ernst & Young U.S. LLC, Cambridge, Mass. "Can I get it with side-by-side doors, an ice dispenser and a GSM connection in harvest gold?" There's always been a lot of talk about networking home appliances, but little action due to the difficulties of pulling wire or making networking run over power lines. But inexpensive networking running over public cellular networks will finally make possible next-generation applications, like a refrigerator that hosts a Web site listing what groceries a family needs and accepts bids from the local stores that want their business. And, of course, a screen on a refrigerator represents an amazing advertising opportunity for Duncan Hines, Kraft and every other food company. Retailer Fry's Electronics already has a refrigerator with an RJ45 jack installed. Cellular is just around the corner. -- Sheldon Laube, chairman, CenterBeam Inc., Santa Clara, Calif. Some Viewpoints - 2:  Some Viewpoints - 2 As more and more nonvocal transactions are performed on our mobile phones, these devices will become the holder of our identities within the next five years. Much like the role of a driver's license, our mobile communications device will serve to authenticate individuals and securely contain credentials and certificates. Biometrics, embedded appropriately, would thwart identity theft. -- Peter Athanas, associate professor, Department of Electrical and Computer Engineering, Virginia Polytechnic Institute and State University, Blacksburg, Va. Within the next five years, all front-end user interfaces for computing will be wireless. -- Sumit Deshpande and Don LeClair, technology strategists, Computer Associates International Inc., Islandia, N.Y. By 2005, mobile access to information will seem as natural as remote control of a TV. In fact, we'll wonder why we spent so much time at a desk. -- Jacob Christfort, chief technology officer for the Mobile Products and Services Division, Oracle Corp. Virus!!!:  Virus!!! [June 23, 2004]   Mobile Computing Security Through Obscurity Last week, Kaspersky Labs announced the discovery of the first virus to infect mobile phones. The virus, which Kaspersky named Cabir, affects mobile phones that use the Symbian OS. The virus is relatively harmless--its only purpose is to propagate itself, and it does so only to other phones that have Bluetooth enabled and are broadcasting their presence. However, Denis Zenkin, head of Corporate Communications at Kaspersky Labs, said that sooner or later, more malicious forms of mobile phone malware that will possibly destroy or steal data will begin to spread. http://www.windowsitpro.com/Article/ArticleID/43071/43071.html Virus!!!:  Virus!!! BRADOR TROJAN (WINDOWS CE) MOSQUIT TROJAN (SYMBIAN) NETSEC Security Brief October 2004 titled “Mobile Computing Security Threats” So! The Other Side:  So! The Other Side Security Trust Privacy Before you go:  Before you go Four probable areas of research ------------------------------------ Reconfigurable Systems Context Modeling Security-Trust-Privacy Efficient Wireless Connectivity About the Paper - Positives:  About the Paper - Positives Nice analysis of Mobility in comparison with Distributed Systems Critical Dimensions recognized Theory Issues well-treated About the Paper - Negatives:  About the Paper - Negatives Verbose Security and Resource Constraint are not treated as first-class concerns Does not categorically mention areas where research needs to be done, rather leaves them as suggestions

Add a comment

Related presentations

Related pages

Week 13: C.J. Anderson highlights - Denver Broncos | Super ...

Broncos running back C.J. Anderson leads the way with 168 yards on the ground and a receiving touchdown in a 29-16 victory over the Chiefs.
Read more

C'Mon Man! Week 13 (12072010) - YouTube

C'Mon Man! Week 13 (12072010) coojofresh. Subscribe Subscribed Unsubscribe 605 605. Loading... Loading... Working... Add to. Want to watch this ...
Read more

Junkyard Jake - Season and Weekly Pass Targets

2015 Top 120 Season and Week 13 Pass Targets: Sorted By Week 13 Pass Targets-Data Thru December 7, 2015: Data compiled from NFL.com: Note:Targets include ...
Read more

C'Mon Man! Week 13, 2012 (12/3/12) - YouTube

C'Mon Man! Week 13, 2012 (12/3/12) Luke's Sports Weekly. Subscribe Subscribed Unsubscribe 43 43. Loading... Loading... Working... Add to.
Read more

74HC14 datasheet & application note - Datasheet Archive

74HC14 datasheet, cross reference, circuit and application notes in pdf format.
Read more

Week 13: Denver Broncos running back C.J. Anderson ...

Denver Broncos running back C.J. Anderson leads the way with 168 yards on the ground and a receiving touchdown in a 29-16 victory over the Kansas City Chiefs.
Read more

Pilar's Picks.com Pilar Lastra's Fantasy Football Picks ...

week 13 (C) 2015 PilarsPicks.com All Rights Reserved. Fantasy Football Expert Pilar Lastra makes her Fantasy Football Picks. HOME; ABOUT; PICKS; LINKS ...
Read more

5A Sports | Week 13

5A Sports was established in 2015 by a group of inspired individuals who recognized the escalating and fiery passion for soccer blazing throughout their ...
Read more

Week 13- C1 Birdie flashcards | Quizlet

Vocabulary words for Week 13- C1 Birdie. Includes studying games and tools such as flashcards.
Read more