Bug Fix of Mobile Terminal Software using Download OTA NTT DoCoMo, Inc. Multimedia Development Department Consumer Equipment Development Department 3-5.

Slides:



Advertisements
Similar presentations
Chapter 3: Introduction to Data Communications and Networking
Advertisements

Ethernet Switch Features Important to EtherNet/IP
IEEE INFOCOM 2004 MultiNet: Connecting to Multiple IEEE Networks Using a Single Wireless Card.
© 2003, Cisco Systems, Inc. All rights reserved..
Mobile Date: A Dating Application For Mobile Phones Mark Mucha and Juan Carcheri EEL-6788 Advanced Topics in Wireless Networks Spring 2010.
Corporate Interface Architecture George Palios. Contents Outlines the activities undertaken to enhance the quality of service of the Corporate interfacing.
doc.: IEEE /0141r2 Submission March 2004 Kei Obara, SIEMENSSlide 1 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs)
GrooveSim: A Topography- Accurate Simulator for Geographic Routing in Vehicular Networks 簡緯民 P
Identity Management Based on P3P Authors: Oliver Berthold and Marit Kohntopp P3P = Platform for Privacy Preferences Project.
Managing Your Network Environment © 2004 Cisco Systems, Inc. All rights reserved. Managing Cisco IOS Devices INTRO v2.0—9-1.
Chapter © 2009 Pearson Education, Inc. Publishing as Prentice Hall.
UNCW UNCW SIGGRAPH 2002 Topic #3: Continuous Media in Wired and Wireless Environments Ronald J. Vetter Department of Computer Science University of North.
Reference: [1] TeamSpace paper
Wireless Application Protocol and i-Mode By Sridevi Madduri Swetha Kucherlapati Sharrmila Jeyachandran.
© 2009 Research In Motion Limited Methods of application development for mobile devices.
1 Token Bucket Based CAC and Packet Scheduling for IEEE Broadband Wireless Access Networks Chi-Hung Chiang
Integrated Product Development in Internet Surroundings Igor Fuerstner Visoka tehnička škola Subotica Vojvodina, Serbia.
InVANET(Intelligent Vehicular Ad Hoc Network
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Application Layer PART VI.
“On the Integration of MPEG-4 streams Pulled Out of High Performance Mobile Devices and Data Traffic over a Wireless Network” Spyros Psychis, Polychronis.
Submission October 2011 doc.:IEEE /1517r0 Santosh Abraham, Qualcomm Incorporated Efficient Device and Service Discovery for Peer-to-Peer (P2P)
Installing software on personal computer
The Origin of the VM/370 Time-sharing system Presented by Niranjan Soundararajan.
Geoinfosys Technologies New Delhi 9 th February 2012 Development of ‘Geographical Information System’ (GIS) based “Decision Support System for Transport”
Internet Business Strategies A strategic view of the various options and connectivity levels available to business through the Internet. Copyright 2011.
SIMULATING A MOBILE PEER-TO-PEER NETWORK Simo Sibakov Department of Communications and Networking (Comnet) Helsinki University of Technology Supervisor:
© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L7 1 Network Security 2 Module 6 – Configure Remote Access VPN.
TECHNOLOGY GUIDE THREE Emerging Types of Enterprise Computing.
PERSONALLY CUSTOMIZABLE GROUP NAVIGATION SYSTEM USING CELLULAR PHONES AND WIRELESS AD-HOC COMMUNICATION Yoshitaka Nakamura, Guiquan Ren, Masatoshi Nakamura,
 ====!"§==Systems= IPonAir T-Systems Nova Content Project goals Reference architecture Reference scenarios Terminology and definition Design principles.
Redes Inalámbricas Máster Ingeniería de Computadores 2008/2009 Tema 7.- CASTADIVA PROJECT Performance Evaluation of a MANET architecture.
Nov/Dec 2003ElectraNet BSP-2 Workshop (khb) 1 EU Telecoms Regulatory Status Governing Legislation Package 2002  Directive 2002/19/EC Access to, and interconnection.
Reliability Andy Jensen Sandy Cabadas.  Understanding Reliability and its issues can help one solve them in relatable areas of computing Thesis.
IEEE R lmap 23 Feb 2015.
Authors: Jiann-Liang Chenz, Szu-Lin Wuy,Yang-Fang Li, Pei-Jia Yang,Yanuarius Teofilus Larosa th International Wireless Communications and Mobile.
TRAQ Manager.NET MES on Microsoft.NET Wrapmation Inc Vladimir L’vov This Presentation is available for download at
03/09/2003Helsinki University of Technology1 Overview of Thesis Topic Presented By: Zhao Xuetao.
Jump Starting ITS Deployment in Los Angeles County using Wireless Communications Lessons Learned.
Policy-Based QoS Management Architecture in an Integrated UMTS and WLAN Environment 莊勝超 洪志宗 張永伸 蘇芳生 IEEE Communications Magazine November 2003 p.118.
Overview Managing a DHCP Database Monitoring DHCP
© 2005 Open Mobile Alliance Ltd. All Rights Reserved. Used with the permission of the Open Mobile Alliance Ltd. under the terms as stated in this document.
Oracle's Distributed Database Bora Yasa. Definition A Distributed Database is a set of databases stored on multiple computers at different locations and.
D2-01_08 Approaches to Smart Grid Communications Networks in Japanese Electric Power Companies Naomasa Takahashi Kyushu Electric Power Co., Inc. Japan.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Living in a Network Centric World Network Fundamentals – Chapter 1.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Living in a Network Centric World Network Fundamentals – Chapter 1.
interactive logbook Paul Kiddie, Mike Sharples et al. The Development of an Application to Enhance.
A seamless handover between cdma2000 and WLAN for 3G-WLAN interworking service continuity 指導教授:黃培壝 學生:陳鵬宇.
Chapter 11. Network Design
An Efficient Wireless Mesh Network A New Architecture 指導教授:許子衡 教授 學生:王志嘉.
OSI Reference Model. Open Systems Interconnection (OSI) Model International standard organization (ISO) established a committee in 1977 to develop an.
1 RealProct: Reliable Protocol Conformance Testing with Real Nodes for Wireless Sensor Networks Junjie Xiong, Edith C.-Ngai, Yangfan Zhou, Michael R. Lyu.
System design for partial liberalization on electric industry Rules related to use of networks Establishment of a fair and transparent transmission rules.
ITGS Network Architecture. ITGS Network architecture –The way computers are logically organized on a network, and the role each takes. Client/server network.
WLAN In Disaster and Emergency Response (WIDER) MidTerm Presentation.
 2001 Prentice Hall, Inc. All rights reserved. 1 Chapter 1, Introduction to the Internet, World Wide Web and Wireless Outline 1.1 Introduction 1.2History.
Using Proxy Cache Relocation to Accelerate Web Browsing in Wireless/Mobile Comm. Authors: Stathes Hadjiefthymiades and Lazaros Merakos Dept. of Informatics.
Understanding the Potential of IT
CISC 849 : Applications in Fintech Jin Gu Dept of Computer & Information Sciences University of Delaware Cyber-security & Finance.
© 2002, Cisco Systems, Inc. All rights reserved..
INTRODUCTION:- The approaching 4G (fourth generation) mobile communication systems are projected to solve still-remaining problems of 3G (third generation)
A Software Energy Analysis Method using Executable UML for Smartphones Kenji Hisazumi System LSI Research Center Kyushu University.
Jia Uddin Embedded System Lab.  MPLS  IMANET  IMANET network model  Proposed model of IMANET with MPLS  Conclusion.
DM Collaboration – OMA & BBF: Deployment Scenarios Group Name: WG5 - MAS Source: Tim Carey, ALU, Meeting Date:
Networks and Security Great Demo
Chapter 27 Network Management Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
5G Wireless Technology.
Accelerating Peer-to-Peer Networks for Video Streaming
Implementation of Computer Maintenance Management system - CMMS
Seminar on…. 5G Wireless Technology By: Niki Upadhyay
TELNET BY , S.AISHWARYA III-IT.
Presentation transcript:

Bug Fix of Mobile Terminal Software using Download OTA NTT DoCoMo, Inc. Multimedia Development Department Consumer Equipment Development Department 3-5 Hikarinooka, Yokosuka-shi, Kanagawa Japan {takeichi, hosokawa, {hoshis, moriyamak, takami, Masato Takeichi, Atsushi Hosokawa, Kazunori Nasu Seiji Hoshi, Koichi Moriyama, Tadao Takami, Kazuaki Terunuma

Introduction Background: Size of software is growing due to increases in mobile terminal functions Increase in the possibility of bugs being inherent. Present: To replace mobile terminal or rewrite the software at retail store: An environment in which users themselves can fix bugs in their mobile terminals rather than taking them to retail stores needs to be established. Realize to update mobile terminal software OTA. Improve user convenience Reduce the costs to replace mobile terminal

Prerequisites 1.Enable users to update their software via easy operation and within a reasonable length of time. 2.Ensure that the impact on the mobile communications network does not exceed the allowable range. 3.Minimize the impact on the cost of mobile terminals. 4.Do not build in any reliance on the mobile terminal architecture. Number of connections to the server and data size to be downloaded must be analyzed. Focusing mainly on conditions 1 and 2

Analysis Before bug-fix Mobile terminal software Bug Bug-fixing data Figure 1. The bug-fixing data for the mobile terminal software After bug-fix Analysis: 1:There is a peak in the assumed number of connections aimed at fixing bugs. 2:The assumed number of connections is sufficiently few compared to the number of normal connections made by all subscribers. 3:Cases in which bug-fixing data may become large due to the type or scale of bug are also assumed. Issues: 1:Transfer control appropriate to the bug- fixing data are needed. 2:Ease of use when data transfer time is long must be ensured.

Access Control Methods Proposal 1: A transfer control method where data transfer to mobile terminals is allowed only within a range that does not affect the network. Proposal 2: A reservation method of software update to enhance convenience to users.

Proposal1: The servers transfer control depending on Allowable Transfer Capacity(1/2) Transfer control appropriate to the bug-fixing data is needed. Server control data transfer after the first connection request from the mobile terminal is received. Bug-fix data Negotiation MT SV Update necessity inquiry 'Transfer completed' notification, 'Update completed' notification Bug-fix data transfer is restricted if facility capacity is exceeded Negotiation Repeated Continuous Transfer GW Figure 2: Access control methods

Allowable transfer capacity Normal traffic volume h Facility capacity Figure 3: Allowable transfer capacity Using allowable data transfer capacity on the existing mobile communications network as the criterion for allowing or denying a connection Proposal1: The server's transfer control depending on Allowable Transfer Capacity(2/2)

Proposal 2: Update software at a reserved time Ensure ease of use when data transfer time is long Enable download to occur at the time when a user is not using the mobile terminal to update the software. Reserved time MT SV Reserved GW Bug-fix data Starting time Negotiation Update necessity inquiry Repeated Continuous Transfer Figure 4:Rewriting software at a preset time

Radio Access Network Transfer request, etc. Mobile communications network Packet GW System design Bug-fixing data, etc. Mobile terminal Server Figure 5: Overall system configuration Bug-fixing data maintenance tool

Implementation of communications protocols and the mobile terminal Figure 6: Basic scenario of communications between mobile terminal and server Figure 7: User mobile terminal operations (Example)

Evaluation of Access Control Methods Normal call: Data communications call using i-mode, etc. Instant call: Call that was allowed to update software at the time it made the connection request Reserved call: Call in which software was updated at a reserved time Denied call: Call that was not allowed to download and update software at the time it made the connection request Figure 8: Results of the Simulation of the Access Control Methods

Conclusion Issues in realizing a mobile terminal software update system that uses wireless communications for the purpose of fixing bugs were identified. The transfer control method based on allowable transfer capacity and transfer permission granted or denied by the server was proposed. A system design proposal that incorporates these methods was illustrated. The validity of the proposed methods based on the simulation results 1.Data volume exceeding the allowable transfer capacity did not enter the network. 2.All denied calls which became subject to the data transfer control were completed the software update by reservation using the time frame where the traffic was lower. At present, we are receiving feedback on the evaluation results and the principle evaluation results using function-simulation terminals based on general terminals and the server,then working on development aimed at building the system for practical use.