20
Information Technology obile Computin Anand Kumar IT/07/18 7th Semester

Mobile computing

Embed Size (px)

DESCRIPTION

 

Citation preview

Page 1: Mobile computing

Information Technology

Mobile Computing

Anand Kumar IT/07/18

7th Semester

Page 2: Mobile computing

Why Mobile Computing ?

People are mobile

Devices are mobile

Page 3: Mobile computing

What is Mobility? A person who moves

Between different geographical locations Between different networks Between different communication devices Between different applications

A device that moves

Between different geographical locations Between different networks

Page 4: Mobile computing

Some mobile Computing Devices

Page 5: Mobile computing

Wireless Networks

Page 6: Mobile computing

Disconnected Operation

Offline feature Automated Predictive Use Friendly Windows Linux OS/2

Let’s see…what

should I do next?

Page 7: Mobile computing

Freedom from Collocation

Natural Evolution of Computing

Single User

OS

Batch

Timesharing

Networking

LANs + WSs

Mobile Computing

More

Fle

xib

le R

esou

rce U

sag

e

Page 8: Mobile computing

Research Issues in Mobile

Computing• Wireless Communications

– Quality of connectivity– Bandwidth limitations

• Mobility

– Location transparency– Location dependency

• Portability

– Power limitations– Display, processing, storage limitations

Page 9: Mobile computing

• Display Only

– InfoPad model: limited portable processing– Constrained to operation within prepared infrastructure,like a cordless phone– Advantages with respect to power consumption, upgradepath, lightweight, impact of lost/broken/stolen device

• Laptop Computer

– ThinkPad model: significant portable processing,operates independently of wireless infrastructure– Disadvantages: power consumption, expensive,significant loss exposure, typically greater than 5 pounds

• Personal Digital Assistant

– Somewhere between these extremes

Classes of Mobile Devices

Page 10: Mobile computing

• Harsh communications environment:

– Lower bandwidth/higher latency:good enough for videoconferencing?– Higher error rates– More frequent disconnection– Performance depends on density of nearby users but inherentscalability of cellular/frequency reuse architecture helps

• Connection/Disconnection

– Network failure is common– Autonomous operation is highly desirable» Caching is a good idea, e.g., web cache– Asynchronous/spool-oriented applications, like mail or printing» Trickle back data when bandwidth is available– Disconnected file systems: CODA (CMU), Ficus (UCLA)

Wireless C0mmunication

Page 11: Mobile computing

Wireless C0mmunication (contd…) • Low Bandwidth

– Orders of magnitude differences between wide-area, in buildingWireless

• Variable Bandwidth

– Applications adaptation to changing quality ofconnectivity» High bandwidth, low latency: business as usual» High bandwidth, high latency: aggressive prefetching» Low bandwidth, high latency: asynchronousoperation, use caches to hide latency, predict futurereferences/trickle in, etc. etc.

• Heterogeneous Networks

– “Vertical Handoff” among co-located wireless networks

Page 12: Mobile computing

– Authentication is critical» Normal network point of attachment is a wall tap» Wireless access makes network attachment too easy– Exposure to over-the-air wiretapping» Any transmitter can also be a receiver!» Some wireless networks provide secure air-links(e.g., CDPD)» Made more difficult by spread spectrum technologies

Security Concerns inWireless C0mmunication

Page 13: Mobile computing

• Address Migration

– Existing applications send packets to a fixed networkaddress– Need to support dynamically changing “local” addressesas mobile device moves through network– Mobile IP specification: home environment tracks mobiledevice’s current location through registration procedure– Route optimization: exploit local caches of <globaldestination node addresses, current care-of address>– Location updates:» Forwarding» Hierarchical mobility agents– Other routing issues: e.g., multicast

Mobility

Page 14: Mobile computing

Source

INTER

NE

TServer

Destination

IP address

Sockets

TCP/UDP

IP

Link Layer

Physical Layer

Mobile : IP Routing

Page 15: Mobile computing

• Location Dependent Services

– Discovery: What services exist in my local environment?e.g., printers, file and compute services, special localapplications, etc.– Follow me services: “Route calls to my current location,”“Migrate my workstation desktop to the nearestworkstation screen”– Information services:» Broadcast/“push” information (e.g., “Flight 59 willdepart from Gate 23”)» “Pull” information (e.g., “What gate will Flight 59depart from?”)– Service migration: computations, caches, state, etc.follow mobile device as it moves through the network– Privacy: what applications can track user locations?

Mobility

Page 16: Mobile computing

• Low Power

– Limited compute performance– Low quality displays

• Loss of Data

– Easily lost– Must be conceived as being “network-integrated”

• Small User Interface

– Limited real estate for keyboards– Icon intensive/handwriting/speech

• Small Local Storage

– Flash memory rather than disk drive

Portability

Page 17: Mobile computing

Portability Issues

It’s the Power: BATTERIES

– Weight, volume determine lifetime– Power consumption: CV2ƒ

Other Batterytypes:– Lead Acid– Nickel Zinc– Rechargeable Alkaline Manganese– Zinc AirLi

gh

ter

Smaller

Page 18: Mobile computing

Concepts in Mobile Computing• Identification

– Subscriber mobility: 700 phone number– Terminal mobility: mobile phone # or IP address– Application mobility

• Registration

– Authentication: who are you?– Authorization: what can you do?– Allocation: how much will I give you?

Putting It All Together

Page 19: Mobile computing

Continued… • Call/Connection Establishment

– Mobile Routing: Mobile IP, Cellular System HLR/VLR– Resource Reservations: Reserve channels in advance– Location Update: forward vs. hierarchy

• Mobility

– Handoff: when to do it, choice of network– Process Migration: application support infrastructure that follows the mobile

• Privacy and Security

– Authentication– Authorization– Encryption: over-the-air security

Page 20: Mobile computing

Thank You !