40 %
60 %
Information about Week13c

Published on April 8, 2008

Author: Teodora

Source: authorstream.com

Slide1:  Software Engineering for Mobility: Yet Another Roadmap Gruia-Catalin Roman, Gian Pietro Picco, Amy L. Murphy Presenter: Somo Banerjee "The future lies in designing and selling computers that people don't realize are computers at all“ Adam Osborne Major trends in Computing:  Major trends in Computing Evolution:  Evolution Computing -------------- Personal Computing - PC Distributed Computing - LAN, WAN, Grid Web Computing - WWW Mobile Computing - PDAs, Cell Phones, SmartPhones Pervasive Computing - !!! Summarizing this Paper – 1:  Summarizing this Paper – 1 Mobile Computing -------------------------- No fixed network structure Nodes may come and go Processes may move among nodes Programs may evolve and change structure Constants are now Variables:  Constants are now Variables Variable Properties ---------------------------------- Location Environment Connectivity Bandwidth I/O devices Security Domain DREAM Environment:  DREAM Environment Issues ----------- Temporary (?) loss of network connectivity Ad-hoc Resource Discovery Scarce Resources Low Battery Power Slow CPU Speed Small amount of Memory Frequent and unannounced changes in the environment DREAMy Devices:  DREAMy Devices Comparison of some mobile devices -------------------------------------------- Requirements for Mobility:  Requirements for Mobility Dynamic Reconfiguration Adaptivity Asynchronous Interaction Context-Awareness Lightweight Middleware Summarizing this Paper - 2:  Summarizing this Paper - 2 Critical Dimensions ---------------------------- Space Coordination Summarizing this Paper - 3:  Space ------- Physical Mobility Logical Mobility Summarizing this Paper - 3 Summarizing this Paper - 4:  Coordination ------------------ Resource Discovery (Extent of) Knowledge about a Resource Synchronization Exchange of Information/Data/Code Summarizing this Paper - 4 Summarizing this Paper - 5:  Summarizing this Paper - 5 Software Engineering ------------------------------- Models Algorithms Summarizing this Paper - 6:  Summarizing this Paper - 6 Models ---------- Unit of mobility Location Context Coordination Mechanism Summarizing this Paper - 7:  Summarizing this Paper - 7 Algorithms ---------------- Control and manage location information of self and neighbors Spatial knowledge Mobile component interaction and communication Connectivity Power Efficiency Summarizing this Paper - 8:  Summarizing this Paper - 8 Systems Research ---------------------- Applications Middleware Summarizing this Paper - 9:  Summarizing this Paper - 9 Applications --------------- Styles of Interaction:  Nomadic interaction Ad-hoc interaction Presence (“Find me”) interaction Styles of Interaction Summarizing this Paper – 10:  Summarizing this Paper – 10 Middleware --------------- Logical Mobility is a design tool Physical Mobility is a requirement A Simple(?) Mobile Application:  A Simple(?) Mobile Application Central DB: e-Shopping Center PC: Belongs to a pair of customers who are also married to each other PDAs: One belonging to each of these two customers E-Shopping System Snapshot Middleware for Mobile Computing:  Middleware for Mobile Computing Transparency or Awareness? ----------------------------------- Replication Context Location Replication:  Replication How to Replicate? When to Replicate? How much to Replicate? Context:  Context Conflict Management Commit Protocol Knowledge about Environment Location:  Location Where? When? Whom? Mobile Middleware Technologies - 1:  Mobile Middleware Technologies - 1 Reflective -- OpenCorba, Open-ORB, DynamicTAO, XMIDDLE Tuple Space -- LIME, TSpaces, JavaSpaces Context-Aware -- Nexus Event-Based -- Hermes Mobile Middleware Technologies - 2:  Mobile Middleware Technologies - 2 Some Viewpoints - 1:  Some Viewpoints - 1 By 2005, the typical cell phone will be indistinguishable from a PDA, and at least one U.S. carrier will support both 802.11 and 2.5G or 3G on the same devices. As an unexpected consequence of this dual-band support, we'll see some instances of bottom-up networks, where devices connect directly with each other on a peer-to-peer basis. This will be a viable alternative to the current monopoly of carriers' antennas. -- John Jordan, principal, office of the chief technologist, Cap Gemini Ernst & Young U.S. LLC, Cambridge, Mass. "Can I get it with side-by-side doors, an ice dispenser and a GSM connection in harvest gold?" There's always been a lot of talk about networking home appliances, but little action due to the difficulties of pulling wire or making networking run over power lines. But inexpensive networking running over public cellular networks will finally make possible next-generation applications, like a refrigerator that hosts a Web site listing what groceries a family needs and accepts bids from the local stores that want their business. And, of course, a screen on a refrigerator represents an amazing advertising opportunity for Duncan Hines, Kraft and every other food company. Retailer Fry's Electronics already has a refrigerator with an RJ45 jack installed. Cellular is just around the corner. -- Sheldon Laube, chairman, CenterBeam Inc., Santa Clara, Calif. Some Viewpoints - 2:  Some Viewpoints - 2 As more and more nonvocal transactions are performed on our mobile phones, these devices will become the holder of our identities within the next five years. Much like the role of a driver's license, our mobile communications device will serve to authenticate individuals and securely contain credentials and certificates. Biometrics, embedded appropriately, would thwart identity theft. -- Peter Athanas, associate professor, Department of Electrical and Computer Engineering, Virginia Polytechnic Institute and State University, Blacksburg, Va. Within the next five years, all front-end user interfaces for computing will be wireless. -- Sumit Deshpande and Don LeClair, technology strategists, Computer Associates International Inc., Islandia, N.Y. By 2005, mobile access to information will seem as natural as remote control of a TV. In fact, we'll wonder why we spent so much time at a desk. -- Jacob Christfort, chief technology officer for the Mobile Products and Services Division, Oracle Corp. Virus!!!:  Virus!!! [June 23, 2004]   Mobile Computing Security Through Obscurity Last week, Kaspersky Labs announced the discovery of the first virus to infect mobile phones. The virus, which Kaspersky named Cabir, affects mobile phones that use the Symbian OS. The virus is relatively harmless--its only purpose is to propagate itself, and it does so only to other phones that have Bluetooth enabled and are broadcasting their presence. However, Denis Zenkin, head of Corporate Communications at Kaspersky Labs, said that sooner or later, more malicious forms of mobile phone malware that will possibly destroy or steal data will begin to spread. http://www.windowsitpro.com/Article/ArticleID/43071/43071.html Virus!!!:  Virus!!! BRADOR TROJAN (WINDOWS CE) MOSQUIT TROJAN (SYMBIAN) NETSEC Security Brief October 2004 titled “Mobile Computing Security Threats” So! The Other Side:  So! The Other Side Security Trust Privacy Before you go:  Before you go Four probable areas of research ------------------------------------ Reconfigurable Systems Context Modeling Security-Trust-Privacy Efficient Wireless Connectivity About the Paper - Positives:  About the Paper - Positives Nice analysis of Mobility in comparison with Distributed Systems Critical Dimensions recognized Theory Issues well-treated About the Paper - Negatives:  About the Paper - Negatives Verbose Security and Resource Constraint are not treated as first-class concerns Does not categorically mention areas where research needs to be done, rather leaves them as suggestions

Add a comment

Related presentations

Related pages

2014-week13c - Chapter 17: Second Order Differential ...

View Notes - 2014-week13c from MATH 253 at University of Calgary. Chapter 17: Second Order Differential Equations Homogeneous equations RECAP A second
Read more

Junkyard Jake - Season and Weekly Pass Targets

2015 Top 120 Season and Week 13 Pass Targets: Sorted By Week 13 Pass Targets-Data Thru December 7, 2015: Data compiled from NFL.com: Note:Targets include ...
Read more

Junkyard Jake - RedZone Rushing Report

Rank Rusher (QB,RB or WR) Team Position Total Rushing Attempts % of Team Rushing Attempts RedZone (Inside 20) Rushing Attempts % of Team RedZone Rushing ...
Read more

Tamil Sermon

கவனம்…சிதறுகிறதா!....செதுக்கப்படுகிறதா! நீ காரணங்களை ...
Read more

ANSWERS A. Complete the Conditional Sentences (Type I) by ...

WEEK 13 ( CONDITIONALS ) ANSWERS A. Complete the Conditional Sentences (Type I) by putting the verbs into the correct form. 1. If you send (send) this ...
Read more


Created Date: 11/9/2011 7:54:34 AM
Read more


Week$13,$Lecture$3$–Radia2on$Detectors$–1$ Radia%on(Detectors(Overview 7$Gas7filled$Devices$ 77$Ion$Chambers$$ GeigerCounters 7SolidstateDevices
Read more

Father Robert Barron - Bible in Tamil

Father Robert Barron . Father Robert Barron is an acclaimed author, speaker, and theologian. He is ministering as Professor of Faith and Culture at ...
Read more

Pittsburgh West, PA Hulafrog | The Week Ahead: Crafts ...

We've got another week of fun in store for you and the kiddos .. from crafts to storytimes and more. Check out our fave event for each day of the week, and ...
Read more