References Overview User attention is by far the most precious resource in a world where computational and networking infrastructure is becoming cheaper.

Slides:



Advertisements
Similar presentations
Mobile Computing and Commerce And Pervasive Computing
Advertisements

1 IEEE Media Independent Handoff Overview of services and scenarios for 3GPP2 Stefano M. Faccin Liaison officer to 3GPP2.
(omniran TG) Short introduction into OmniRAN P802.1CF Date: Authors: NameAffiliationPhone Max RiegelNokia.
Omniran TG 1 Cooperation for OmniRAN P802.1CF Max Riegel, NSN (Chair OmniRAN TG)
A Pervasive Reminder System for Smart Homes Sylvain GIROUX and Simon GUERTIN Département d’informatique, Université de Sherbrooke 2500 boul. Université,
Introduction to Unlicensed Mobile Access. Contents Basic Concept Operation Overview Major Advantages.
UMA (Unlicensed Mobile Access) El Ayoubi Ahmed Hjiaj Karim.
How are we going to get there? Perry Correll Xirrus, Principal Technologist How will White Spaces impact the consumer market?
Chapter 61 Introduction to Information Technology Turban, Rainer and Potter John Wiley & Sons, Inc. Copyright 2005.
Grant agreement n° SDN architectures for orchestration of mobile cloud services with converged control of wireless access and optical transport network.
UNDERSTANDING JAVA APIS FOR MOBILE DEVICES v0.01.
Wireless networking technology By Abbas Izadpanah January 2007.
Kick-off Meeting Athens 05/10/2004 The project ’POMPEI - P2p, location and presence mobile services for managing crisis and disaster situations’
9 Lecture The Wireless Revolution. Identify the principal wireless transmission media and devices, cellular network standards and generations, and standards.
Overview.  UMTS (Universal Mobile Telecommunication System) the third generation mobile communication systems.
By Abdullah Al-Dossary Ahmad Al-Suhaibani
ProActive Infrastructure Eric Brewer, David Culler, Anthony Joseph, Randy Katz Computer Science Division U.C. Berkeley ninja.cs.berkeley.edu Active Networks.
1 An overview Always Best Connected Networks Dênio Mariz Igor Chaves Thiago Souto Aug, 2004.
Emerging Research Dimensions in IT Security Dr. Salar H. Naqvi Senior Member IEEE Research Fellow, CoreGRID Network of Excellence European.
1 Wireless LANs. 2 Introduction Types of Communication Networks. LAN’s Configurations. Wireless Technology. –Definition. –Applications. –Example. Communications.
1. Context: Ambient Intelligence Ambient Intelligence (AmI) represents a vision of ubiquitous computing, sensing and actuating to unobtrusively enhance.
Bluetooth Network Prepared By: Sara Ayad Aldehany.
4G BROADBAND BROADBAND Broadband is the marketing term for wireless Internet access through a portable modem, mobile phone, USB wireless.
Basic Networking Components
NETWORKS – NETWORK FUNDAMENTALS. How do computers connect to each other? Wired vs. Wireless Network cards Special device on computer that lets the computer.
How to Integrate a WiFi Network for Mobile Devices
Mobile IP: Introduction Reference: “Mobile networking through Mobile IP”; Perkins, C.E.; IEEE Internet Computing, Volume: 2 Issue: 1, Jan.- Feb. 1998;
Configuring Routing and Remote Access(RRAS) and Wireless Networking
Lecture 1 Wireless Networks CPE 401/601 Computer Network Systems slides are modified from Jim Kurose & Keith Ross All material copyright J.F.
Module Common Network Environments, Connectivity and Security Issues.
ITED 328 Lecture 4 12 Feb 2004 Loosely covering Chapter 5 Internet and LAN Technology.
Performance analysis and prediction of physically mobile systems Point view: Computational devices including Mobile phones are expanding. Different infrastructure.
Chapter 2: Information Technology and AISs
Doc.: IEEE /0981r1 TGs Reference Architecture Considerations September 6, 2004 Tricci So & W. Steven Conner.Slide 1 TGs ESS Mesh System Reference.
Module 8 Configuring Mobile Computing and Remote Access in Windows® 7.
6: Wireless and Mobile Networks6-1 Chapter 6 Wireless and Mobile Networks Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition.
Cognitive Radio Networks
Introduction Infrastructure for pervasive computing has many challenges: 1)pervasive computing is a large aspect which includes hardware side (mobile phones,portable.
Reconsidering Internet Mobility Alex C. Snoeren, Hari Balakrishnan, M. Frans Kaashoek MIT Laboratory for Computer Science.
1 BRUSSELS - 14 July 2003 Full Security Support in a heterogeneous mobile GRID testbed for wireless extensions to the.
Master Course /11/ Some additional words about pervasive/ubiquitous computing Lionel Brunie National Institute of Applied Science (INSA)
What’s MPEG-21 ? (a short summary of available papers by OCCAMM)
Bluetooth Techniques Chapter 15. Overview of Bluetooth Initially developed by Swedish mobile phone maker in 1994 to let laptop computers make calls over.
A seamless handover between cdma2000 and WLAN for 3G-WLAN interworking service continuity 指導教授:黃培壝 學生:陳鵬宇.
Abstract A Structured Approach for Modular Design: A Plug and Play Middleware for Sensory Modules, Actuation Platforms, Task Descriptions and Implementations.
Network Components David Blakeley LTEC HUB A common connection point for devices in a network. Hubs are commonly used to connect segments of a LAN.
Jini Architectural Overview Li Ping
ProActive Infrastructure Eric Brewer, David Culler, Anthony Joseph, Randy Katz Computer Science Division U.C. Berkeley ninja.cs.berkeley.edu Active Networks.
Protocol design for All-IP Computer Framework Kouji Okada Keio University
Wireless Networks Standards and Protocols & x Standards and x refers to a family of specifications developed by the IEEE for.
TOPIC 1.3 INTRODUCTION TO NETWORKING. Router – A netwok interconnection device & associated software that links two networks. The networks being linked.
GRID ANATOMY Advanced Computing Concepts – Dr. Emmanuel Pilli.
1 Architecture and Behavioral Model for Future Cognitive Heterogeneous Networks Advisor: Wei-Yeh Chen Student: Long-Chong Hung G. Chen, Y. Zhang, M. Song,
Mobile IP 순천향대학교 전산학과 문종식
WOSS 04 1 Task-based Self-adaptation David Garlan Bradley Schmerl Joao Sousa Vahe Poladian Carnegie Mellon University WOSS’04.
IEEE MEDIA INDEPENDENT HANDOVER DCN: Title: Proposed Presentation for 3GPP Date Submitted: September,
Software Architecture of Sensors. Hardware - Sensor Nodes Sensing: sensor --a transducer that converts a physical, chemical, or biological parameter into.
Virtual Local Area Networks In Security By Mark Reed.
Communication Protocol Engineering Lab. A Survey Of Converging Solutions For Heterogeneous Mobile IEEE Wireless Communication Magazine December 2014 Minho.
Jee sook, Eun May 2004 Presented in IEEE 802.1af - key management
Group 2: Qiuxi Zhu, Buchao Yu, Guoxi Wang
Meng Cao, Xiangqing Sun, Ziyue Chen May 28th, 2014
Wireless ATM PRESENTED BY : NIPURBA KONAR.
Mobile Computing.
Cognitive Radio Networks
Unit V Mobile Middleware.
IEEE MEDIA INDEPENDENT HANDOVER DCN:
IEEE MEDIA INDEPENDENT HANDOVER DCN:
A New Architecture for Heterogeneous Networking
Presentation transcript:

References Overview User attention is by far the most precious resource in a world where computational and networking infrastructure is becoming cheaper and cheaper. In that same world, applications are expected to make optimum use of the dynamically changing resources offered by different environments as users move around. Applications thus have to be conscious of their environment making the best use of its resources. However, adapting to environment and reconfiguration should occur transparently from the user. To allow you to watch a match on a PDA in the car, then resume watching it on the big screen at home once you arrive there, without having to adjust channels and perhaps starting at the last scene you last watched, we look into behavior of mobile applications that persist across devices and networks. Work in Progress Data-Centric Model of Mobile Applications The model classifies the mobile application data according to persistence, update frequency and the credentials and access rights attached to them. Data items are thus classified as: volatile vs. persistent, dynamic vs. static and public vs. private. Application developers can tag data used by their applications according to this classification at design time. 1.Ambient Networks. IST project portal: networks.org/ 2.Pebbles in Oxygen and Autohan: 3.IEEE : 4.MetaCase: Domain Specific Modelling with MetaEdit+: Approach We construct a Domain Specific Language for Mobile Applications. The data-centric model is used to construct primitives in this domain language. Such primitives handle the data housekeeping tasks. The application developer tags the data attributes of his application appropriately based on the model, and the domain specific language compiler generates the needed code for handling data persistence and updates. Future Directions - Support application persistence based on heterogeneous network infrastructure technologies, such as ambient networking or IEEE Grant a dictated level of quality of service for an application as it migrates from one network to another. - Maintaining and authenticating user credentials across several networks and environments. - Look at the potential of virtualization techniques in supporting stateful application migrations across networks and environments. Related Work IEEE IEEE specifies a set of communication protocols across the 802 family (wireless LAN- WIFI- CDMA..). How to allow the laptop or mobile phone to select which network to use? Can we guarantee moving (Handover) between two different networks while sustaining the same level of quality of service? IEEE looks into the integration within the 802 family of protocols and together with other technologies. Ambient Networking Ambient networking is an IST funded project targeting the integration of multiple radio access technologies, code division technologies and Bluetooth. Ambient networking users can seamlessly choose the network to connect to, while operators are assisted through network management and configuration utilities. Pebbles Framework Pebbles are independent software or hardware units. Orchestrated through an application creation layer, pebbles are invoked according to the user target and depending on available resources in the environment. The pebbles framework is a joint work between Cambridges computer laboratory and MITs computer science and Research Questions ? How to sustain the application state as the application migrates and adapts to the environment? ? How can the augment the networking stack to support the persistence of applications as they move across different networks? ? How to enable the application developer to specify application response to presence or absence of certain resources? Current Stage We are looking into the definition of the domain specific language for mobile computing. We will proceed next to optimize the application layer of ambient network protocol for application migration. Whatever, Whenever & In-between ! Whatever, Whenever & In-between ! Persistent Applications Across Networks AI lab. Systems Group The Computer Laboratory University of Cambridge PhD student: Aisha Elsafty Supervisor : Dr. David Greaves