Raul Barral Tamayo's Blog

Pasen Y Vean [R]

Fundamentals of Mobile and Pervasive Computing by Frank Adelstein – Brief Remarks

Posted by Raul Barral Tamayo en Miércoles, 17 de septiembre, 2008

It explains a revolutionary and rapidly evolving paradigm for computing: mobile users seamlessly interacting with wireless devices embedded in the environment. These devices provide a platform for many novel applications, ranging from pervasive health monitoring to homeland security.

The only authoritative source offering a holistic view of pervasive computing, it explains computing fundamentals from the increasingly dominat mobile perspective.

This text helps you to:

  • Get a panoramic view of the fastest-growing and most dynamic field in computing.
  • Learn the underlying engineering principles that make pervasive computing work.
  • Get in-depth understanding of the most dynamic technologies for service discovery, wireless security, wireless sensor networking and other key components.
  • Perform practical exercises and projects that demonstrate how the pieces work and fit together.
  • Preview the latest research that will help realize the full potential of pervasive computing.

Complete with numerous specific examples of how pervasive computing technologies are used and integrated, this missing-link volume definitely describes the present and future of mobile and pervasive computing.

Notes extracted from the book:

  • Mobile computing systems are distributed systems with a network to communicate between different machines.
  • Making systems resilient and adaptive is not a trivial task.
  • Mobile computers can be expected to be more resource-poor than their static counterparts.
  • Mobile computers are less secure and reliable.
  • Mobile connectivity can be highly variable in terms of its performance (bandwith and latency) and reliability.
  • In general, resource availability and quality vary dynamically.
  • The CS model permits a resource-poor mobile client to request a resource-rich server to perform expensive computations on its behalf.
  • Another way to adapt to resource availability is by varying the quality of data (fidelity) that is made available to the application running on the mobile client.
  • Of particular interest to data adaptation are transcoding proxies.
  • Mobile IP is an extension of IPv4 to support host mobility at the IP layer, operations of location management and packet rerouting are tied closely together.
  • In mobile computing, the publish-subscribe mode is combined with the broadcast nature of wireless communication provide resource-efficient and scalable information delivery.
  • Mobile wireless networks are predominantly of two types: architecture-based and architecture-less.
  • Presence of asymmetric communication links.
  • Mobile nodes may have to compete with several other mobile nodes to get access to an upstream channel.
  • Data may be location and time context dependent.
  • An architectureless wireless network or a mobile ad hoc network (MANET) consists solely of mobile computing devices within mutual wireless communication range.
  • It’s highly desirable that users are able to continue working on their tasks irrespective of the state of connectivity.
  • Caching of frequently accessed data locally at a mobile node can further reduce the overheard.
  • Hoarding is a scheme that tries to ensure availability of data during disconnection.
  • In context-aware computing, the application adapts aswell to the presence of contextual information.
  • Pioneering work in context-aware computing was started in the early 90s at Xerox PARC Laboratory and Olivetti Research, Ltd. under the vision of ubiquituos computing.
  • Ubiquitous computing concerns not just mobility of computers but, more important, mobility of people.
  • Power available to an ad hoc node generally is limited because the node uses wireless communication for networking and often is placed in an environment where there is no readily available power supply.
  • It requires each application to be optimized for space utilization and places significant bounds on the complexity of the application.
  • Very limited input and output options owing to their small form factor.
  • Ad hoc networks are not necesarily mobile.
  • WEP was designed to raise the baseline security level to be comparable with standard wired Ethernet, however, several severe design flaws rendered it virtually useless.
  • Wi-Fi protected access (WPA) was created as an interim measure to increase the security.
  • Attacker capabilities: eavesdropping, impersonation of a user, impersonation of a network, “man in the middle” and compromising authentication in the network.

Related links:

It’s the book that was supposed to teach me all concepts behind pervasive computing but honestly there are many concepts in the book but it misses the pervasive focus i was expecting :(.

F. Adelstein, S.K.S. Gupta, G.G. Richard III and L. Schwiebert, Fundamentals of Mobile and Pervasive Computing, McGraw Hill, 2005, ISBN: 0-07-141237-9.




Introduce tus datos o haz clic en un icono para iniciar sesión:

Logo de WordPress.com

Estás comentando usando tu cuenta de WordPress.com. Cerrar sesión /  Cambiar )

Google+ photo

Estás comentando usando tu cuenta de Google+. Cerrar sesión /  Cambiar )

Imagen de Twitter

Estás comentando usando tu cuenta de Twitter. Cerrar sesión /  Cambiar )

Foto de Facebook

Estás comentando usando tu cuenta de Facebook. Cerrar sesión /  Cambiar )


Conectando a %s

A %d blogueros les gusta esto: