You are on page 1of 29

ARCHITECTURE CHALLENGES AND RESEARCH ISSUES ON MOBILE COMPUTING

A Technical Seminar Report Submitted in partial fulfillment of the requirements for the award of degree of

MASTER OF TECHNOLOGY IN INFORMATION TECHNOLOGY

of JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY, HYDERABAD

SUBMITTED BY

T.V.DIVYA(10c91d4017)

DEPARTMENT OF INFORMATION TECHNOLOGY HOLYMARY INSTITUTE OF TECHNOLOGY AND SCIENCE (Approved by AICTE New Delhi, Affiliated to JNTU, Hyderabad) BOGARAM(V), KEESARA (M), R.R DISTRICT- 501301. 2010-2011

ABSTRACT:Mobile data communication has become a very important and rapidly evolving technology as it allows users to transmit data from remote locations to other remote or fixed locations. This proves to be the solution to the biggest problem of business people on the move-mobility. With the advent of the Internet and the plurality and variety of fancy applications it brought with it, the demand for more advanced services on cellular phones is increasingly becoming urgent. Unfortunately, so far the introduction of new enabling technologies did not succeed in boosting new services. The adoption of Internet services has shown to be more difficult due to the difference between the Internet and the mobile telecommunication system. We in this paper describes about the Mobility Services Architecture which supports applications by a middleware stub. The goal of this paper is to examine the characteristics of the mobile system and to clarify the constraints that are imposed on existing mobile services. The paper will also investigate successively the enabling

technologies and the improvements they brought. Most importantly, the paper will identify their limitations and capture the fundamental requirements for future mobile service architectures namely openness, separation of service logic and content, multidomain services, personalization, Personal Area Network (PAN)-based services and collaborative services. The paper also explains the analysis of current mobile service architecture such as voice communication, supplementary services with intelligent network, enabling services on SIM with SIM application tool kit, text services with short message service, internet services with WAP and dynamic applications on mobile phones with J2ME. Further our paper gives information on challenges of mobile computing which includes harsh communications, connections, bandwidth and heterogeneous networks. Under research issues seamless connectivity over multiple overlays, scalable mobile processing, wireless communications, mobility and portability are discussed. The paper concludes with the pros and cons of this mobile computing and its future.

CONTENTS
TOPIC PAGE NO.

1. Introduction 2. Evolution of Wireless Networks and Services

1 2

2.1. Analysis of Current Mobile Service Architectures 5 2.2 ADVANCED ARCHITECTURE 3. Types Of Mobile Computing 4. Challenges Of Mobile Computing 5. Merits 6. Demerits 7. Applications 8. Research Issues 9. Wireless Internet Future
10.Conclusion 10. References

8 10 13 17 17 18 20 21 22
23

LIST OF FIGURES
NAME OF THE FIG. PAGE NO.

1. Evolution of Wireless Networks 2. Current mobile services including SAT applications: SMS, WAP 3. Multi domain services 4. Collabrative Services 5. Variable Bandwidth 6. Heterogeneos Wireless Overlay Networks 7. Mobility Challenges: Horizontal Roaming 8. Mobility Challenges: Vertical Roaming 9. Overlay Internetworking 10. State of art Networking Infrastructure 11. Wireless Internet Future

4 6 9 10 14 14 15 15 15 16 20

INTRODUCTION
Todays fast growing world needs faster communication. Technology is making rapid progress and is making many things easier. The innovative ideas that have been emerged from the tender minds of young scientists led to the evolution of many techniques where our present topic MOBILE COMPUTING fits in. MOBILE COMPUTING and COMMUNICATIONS is a major part of wireless communication technology. Mobile computing in means computing done by intermittently connected users who access network resources. It requires a wireless medium such as cellular radio, radio nets and low-orbit satellites. It incorporates wireless adapters using cellular telephone technology to connect portable computers with the cabled network. Mobile voice communication is widely established throughout the world and had a very rapid increase in the number of subscribers to the various cellular networks over the last few years. An extension of this technology is the ability to send and receive data across these cellular networks. This is the principle of mobile computing. The most familiar aspect of mobile computing technology is the hand phone. About two decades ago, a hand phone was bulky and was only used for voice communication. It was merely an extension of the fixed line telephony that allowed users to keep in touch with colleagues. Now the hand phone is not only used for voice communication, it is also used to send text and multimedia messages. Future mobile devices will not only enable Internet access, but will also support high-speed data services. In addition to the hand phone, various types of mobile devices are now available, for example, personal digital assistants (PDAs) and pocket personal computers (PCs). Road warriors use mobile devices to access up-to-date information from the corporate database. A police officer at a crime scene may send a fingerprint picked up there for matching with data in a central database through a wireless network, hence leading to faster identification and arrest of potential suspects. The global positioning 5

system (GPS) is used in search and rescue missions, for monitoring and preservation of wildlife, and for vehicle theft prevention. Though many of us are unaware of when mobile computing technology is being used, it has permeated all aspects of our lives. The paper starts with a study of how mobile services are implemented in mobile telecommunication systems and an identification of their limitations so as to meet the future needs of the future.

2. EVOLUTION OF WIRELESS NETWORKS AND SERVICES:The first generation (1G) wireless network was analog. The first in North America was advanced mobile phone system (AMPS), which was based on frequency division multiple access. A total of 1664 channels were available in the 824 to 849 MHz and 869 to 894 MHz band, providing 832 downlink (DL) and 832 uplink (UL) channels. AMPS, widely used in North America, supports frequency reuse. The underlying network is a cellular network where a geographical region is divided into cells. A base station (BS) at the center of the cell transmits signals to and from users within the cell. The second generation (2G) systems onward are digital. Digital systems make possible an array of new services such as caller ID. The Global System for Mobile Communications (GSM) is a popular 2G system. GSM offers a data rate of 9.6 to 14.4 kbps. It supports international roaming, which means users may have access to wireless services even when traveling abroad. The most popular service offered by GSM is the Short Message Service (SMS), which allows users to send text messages up to 160 characters long. 2.5G systems support more than just voice communications. In addition to text messaging, 2.5G systems offer a data rate on the order of 100 kbps to support various data technologies, such as Internet access. Most 2.5G systems implement packet switching. The 2.5G systems help provide seamless transition technology between 2G and third generation (3G) systems. The following are 2.5G systems:

High-Speed Circuit-Switched Data (HSCSD): Even though most 2.5G systems implement packet switching, HSCSD continues support for circuit-switched data. It offers a data rate of 115 kbps and is designed to enhance GSM networks. The access technology used is time division multiple access (TDMA). It provides support for Web browsing and file transfers. General Packet Radio Service (GPRS): GPRS offers a data rate of 168 kbps. It enhances the performance and transmission speeds of GSM. GPRS provides always-on connectivity, which means users do not have to reconnect to the network for each transmission. Because there is a maximum of eight slots to transmit calls on one device, it allows more than one transmission at one time; for example, a voice call and an incoming text message can be handled simultaneously. Enhanced Data Rates for GSM Evolution (EDGE): EDGE works in conjunction with GPRS and TDMA over GSM networks. Its offered data rate is 384 kbps. EDGE supports data communications while voice communications are supported using the technology on existing networks. Third-generation (3G) wireless systems are designed to support high bit rate telecommunications. 3G systems are designed to meet the requirements of multimedia applications and Internet services. The bit rate offered ranges from 144 kbps for full mobility applications, 384 kbps for limited mobility applications in macro- and microcellular environments, and 2 Mbps for low-mobility applications in micro- and Pico cellular environments. A very useful service provided by 3G systems is an emergency service with the ability to identify a user's location within 125 m 67% of time. Figure 1.1 shows the evolution of wireless standards.

Initially, the International Telecommunication Union (ITU) intended to design a single 3G standard; however, due to a number of difficulties, it has ratified two 3G standards. The two standards are CDMA2000, which provides a bit rate of up to 2.4 Mbps, and wideband CDMA (WCDMA), which provides a bit rate of up to 8 Mbps. The high bit rate enables new wireless services that can be classified into three categories: 1. Information retrieval: It permits location-aware applications to remotely download information from a corporate database. 2. Mobile commerce: It allows users to book a flight or pay bills. 3. General communication: It permits users to make or receive phone calls, send or receive messages, or activate an air conditioner at home. Compound wireless service enables users to combine different types of services to carry out specialized functions. For example, you can take a photo using a camera phone and send it to a friend using the multimedia message service (MMS). A more useful application would be to combine a home alarm system with a wireless service so that when an intruder is detected, a photo of the intruder is captured by the surveillance camera and sent to the authorities, while the owner is alerted via mobile phone. A compound service comprises a fundamental wireless service (one that cannot be partitioned into smaller identifiable services), a utility service (one that carries out a function within a particular compound service sequence), and possibly another compound service. For example, consider a courier service driver who has to deliver a document before a certain deadline and he has to find the fastest and least congested route to his destination. He makes use of a route planning application on the wireless terminal in his van, which consists of three fundamental wireless services: 1. A location service to determine the current location of the driver. 2. A travel route computation to determine the least congested and fastest route to his destination. 3. Traffic information retrieval to obtain traffic information from various sources.

The compound service consists of continuous iterations of these services: determine the current location and provide it to the wireless terminal, compute the least congested route from the current location to the destination, and retrieve the most updated traffic information. It involves executing step 1 and deciding whether to repeat step 2. Going back to step 1 is the utility service.

2.1.ANALYSIS OF CURRENT MOBILE SERVICE ARCHITECTURES:a) Voice communication: As indicated by its name, the objective of mobile telecommunications systems is to provide communication between mobile distant persons. These systems only supported direct voice communication or telephony between two participants, but supplementary services like call forwarding, barring and voice mail were added later on. The mobile telephony service is realized by components represented by grey ovals that are distributed both on the mobile phone, also called Mobile Station (MS) and on the mobile network. On the MS, there are components both on the Mobile Equipment (ME) and on the subscriber Identity Module (SIM). To establish a telephone conversation the service components on the MS are collaborating with the ones on the mobile network to allocate a channel and to maintain it throughout the session even when the MS is moving and changing base stations. The components on the mobile phone are installed by the manufacturer while the ones on the network are delivered by network suppliers. b) Supplementary services with intelligent network: It does not take long time before there is a need for more advanced call control ser-vices like call forwarding, barring, voice mail, premium call, etc. As shown in Figure 3 an IN (Intelligent Network [1]) Service Control Point (SCP) is introduced In the mobile network to allow the implementation of supplementary services. It is worth mentioning that these services are derivatives centered around the voice communication service. Another restriction is that the SCP is implemented on

10

equipment manufacturer proprietary technologies. The SCP is also located inside the telecom operator domain making third party service development difficult.

(c)Enabling services on the SIM with SIM Application Toolkit(SAT): The telecom operators want to have other services than telephony and its derivatives and turn to the SIM, which are their property. Unfortunately, although the SIM is a smart card having both processing and storage capabilities necessary for new services. The SIM is supposed to be the slave executing orders from its master, the ME. To remedy this, the SIM Application Tool-kit (SAT) [2] is introduced to allow applications/services residing on the SIM to control the input and output units. With SAT it is possible to develop applications on the SIM but there are many restrictions. First

11

SAT applications should be small in size. Secondly, the installation of applications on the SIM is controlled by operators who are reluctant to open the access due to security. (d) Text services with Short Message Service (SMS): SMS-C is responsible to store and forward messages to and from mobile phone (see Figure 3). In the illustration, components used for SMS are the client (C) in the ME advanced SMS services are implemented by perlscripets. Provisioning of SMS services requires installation of the above mentioned application on an SMS Gateway the system running the SMS Gateway to act as an SMSC itself (e.g. a PC using a radio modem through a serial port). To have direct access to an SMSC requires cooperation with the operator that owns the SMSC, which often can provide a TCP connection for sending/receiving SMS messages part of a service. The advantage of the above solution is that to receive revenue from generated traffic. The problem with access to SMS services is remembering both the service access number and the additional identifiers and parameters for a specific service (the protocol) (e) Internet access with WAP: Wireless Application Protocol (WAP) [5] was to provide access to the WWW on handheld terminals. A micro browser installed in the Mobile Equipment is communicating with a WAP Proxy introduced between the Internet and the mobile network to convert Internet protocols to Wireless binary protocols as shown in Figure 3. On the terminal side, a WAP browser is located in the ME and services are connected to a Web server on the network side. Development of WAP services can be performed by programming experience. Most services typically consist of some static WML content together with a CGI-script as back-end that can generate dynamic content retrieved from for example other Web sites or from a DBMS. One restriction of the technology is that it is not possible to access ordinary web pages using a WAP browser. (e) Dynamic applications on mobile phones with J2ME (CLDC/MIDP): Unlike a computer, the functionality of the mobile phones is defined at manufacture time and it is not possible to install new applications. With introduction of the J2ME CLDC/MIDP vast amount of sophisticated applications, called MIDLETS can 12

be found on the Internet. With J2ME, it is possible to develop dynamic standalone applications. When it comes to SMS, there are still some restrictions in J2ME, such as access to the standard inbox for SMS messages on a handset is not allowed. Process, the write-once-run-anywhere concept is not valid for this platform. Through the Most Integrated Development Environments (IDE) for Java allows development of J2ME applications as well. Although J2ME is a standardized technology, performed Java Community

2.2 ADVANCED ARCHITECTURE:This section aims at identifying and elucidating the advanced pieces and hence contributes to the definition of advanced architecture. (a) Separation of service content and logic: Mobility is the ultimate requirement for mobile services. The mobility properties of a service are dependent on the architecture and particularly on the location of the components making up the service. Considering a service as consisting of two components, service logic and service content, makes the analysis easier. In early mobile telecom services the service logic was embedded in the dedicated hardware components. This has been a hindrance for development of flexible services; these services will by default not be accessible from outside an operator domain. To enhance the mobility of ser-vices, it is necessary to decouple the service logic from the system components. (b) Multi-domain services: By using this service we cannot only access all services provided by the network but also many users can work at the same time. Mobile services will be provided as distributed services where the logics residing in different places will cooperate in delivering the end user service.

13

c) PAN-based Services: Nowadays, each individual is using several devices like mobile phones, PDAs, digital camera, GPS, etc. With the emergence of wireless short-range technologies like Bluetooth, WLAN and potentially, Personal Area Networks can be formed to allow communication between devices. (d) Collaborative Services: With a multi-domain service, it will be possible for people not only to collaborate across network boundaries, but also across terminal boundaries. It is also possible for several people to collaborate by exchanging information through several Channels and devices simultaneously such As talking on the phones, showing picture on digital cameras, reading documents on PDAs.

14

3. TYPES OF MOBILE COMPUTING:Mobile computing is a generic term describing one's ability to use technology while moving, as opposed to portable computers, which are only practical for use while deployed in a stationary configuration. Many types of mobile computers have been introduced since the 1990s, including the:

Wearable computer Personal digital assistant Smartphone Carputer Ultra-Mobile PC

Wearable computers:Wearable computers are computers that are worn on the body. This type of wearable technology has been used in behavioral modeling, health monitoring systems, information technologies and media development. Wearable computers are especially useful for applications that require computational support while the user's hands, voice, eyes, arms or attention are actively engaged with the physical environment.

15

"Wearable computing" is an active topic of research, with areas of study including user interface design, augmented reality, pattern recognition, use of wearables for specific applications or disabilities, electronic textiles and fashion design. Many issues are common to the wearables, mobile computing, Pervasive computing, Ambient intelligence and ubiquitous computing research communities, including power management and heat dissipation, software architectures, wireless and personal area networks.

PDA:A personal digital assistant (PDA) is a mobile device, also known as a palmtop computer. PDAs are used to organize a person's life by taking notes, holding contacts, and connecting to the Internet. Newer PDAs commonly have color screens and audio capabilities, enabling them to be used as mobile phones (smartphones), web browsers, or portable media players. Many PDAs can access the Internet, intranets or extranets via Wi-Fi, or Wireless Wide Area Networks (WWANs). Many PDAs employ touchscreen technology. The term PDA was first used on January 7, 1992 by Apple Computer CEO John Sculley at the Consumer Electronics Show in Las Vegas, Nevada, referring to the Apple Newton.

Smart phone:A smart phone is a mobile phone offering advanced capabilities, often with PC-like functionality (PC-mobile handset convergence). There is no industry standard definition of a smartphone. For some, a smartphone is a phone that runs complete operating system software providing a standardized interface and platform for application developers. For others, a smartphone is simply a phone with advanced features like email, Internet and e-book reader capabilities, and/or a built-in full keyboard or external USB keyboard and VGA connector. In other words, it is a miniature computer that has phone capability.

16

Carputer:Carputer is the predominant term used to describe a category of mobile computer, designed or modified to specifically be installed and run in automobiles. Historically these were based on industrial personal computer technology, but as smartphones and PDAs have become more powerful, and have included useful technologies like GPS and bluetooth they have become the predominant base platform for developing carputers.

Ultra-Mobile PC:-

In personal computers, Ultra-Mobile PC (often abbreviated UMPC) is a term for a small form factor and specification for tablet PCs. Originally codenamed Project Origami, the project was launched in 2006 as collaboration between Microsoft, Intel, Samsung, and a few others. As of late 2009, there were very few devices on the market and UMPC device category was expected to go extinct soon, according to CNET.

17

4. CHALLENGES OF MOBILE COMPUTING:

HARSH COMMUNICATIONS ENVIRONMENT:

The unfavorable Communication environment is coupled with Lower bandwidth/higher latency not well enough for videoconferencing or any other process. It has higher error rates and more frequent disconnection. Its performance depends on density of nearby users but inherent scalability of cellular/frequency reuse architecture helps.

CONNECTION/DISCONNECTION:
Network failure is a common issue and therefore Autonomous operation is highly desirable. For it often caching is a good idea, e.g., web cache. Asynchronous/spool-oriented applications, like mail or printing do have some problems .In those cases Trickle back data when bandwidth is available.

LOW BANDWIDTH:
Orders of magnitude differences between wide-area, in building wireless Mobile internet access is generally slower than direct cable connections, using technologies such as GPRS and EDGE, and more recently 3G networks. These networks are usually available within range of commercial cell phone towers. Higher speed wireless LANs are inexpensive, but have very limited range.

18

VARIABLE BANDWIDTH:
Applications adaptation to changing quality of connectivity High bandwidth, low latency: business as usual High bandwidth, high latency: aggressive prefetching Low bandwidth, high latency: asynchronous operation, use caches to hide latency,etc.

HETEROGENEOUS NETWORKS:
Vertical Handoff among collocated wireless networks

19

MOBILITY CHALLENGES HORIZONTAL ROAMING:

MOBILITY CHALLENGES VERTICAL ROAMING:

OVERLAY INTERNETWORKING:

20

STATE OF THE ART IN-BUILDING NETWORK INFRASTRUCTURE:

SECURITY STANDARDS:
When working mobile one is dependent on public networks, requiring careful use of VPNs.

POWER CONSUMPTION:
When a power outlet or portable generator is not available, mobile computers must rely entirely on battery power. Combined with the compact size of many mobile devices, this often means unusually expensive batteries must be used to obtain the necessary battery life.

TRANSMISSION INTERFERENCES:
Weather, terrain, and the range from the nearest signal point can all interfere with signal reception. Reception in tunnels, some buildings, and rural areas is often poor.

21

5.MERITS:
The benefits of automating data collection applications with mobile computing are the reduction of hard and soft costs, enhancement of revenue potential, and a distinct competitive advantage through: Improving the data collection process Improving data accuracy Reducing paperwork Enforcing collection of more complete information Facilitating collection of more useful information Eliminating redundant data entry Reducing administrative costs Reducing billing errors Reducing data backlog Improving information flow Allowing faster adaptation to changing business conditions Increasing responsiveness and customer satisfaction Providing access to previously unavailable information

6.DEMERITS:
The demerits of the mobile computing are discussed as follows: Information access via a mobile device is plagued by low available bandwidth, poor connection maintenance, poor security, and addressing problems. Unlike their wired counterparts, design of software for mobile devices must consider resource limitation, battery power and display size. Consequently, new hardware and software techniques must be developed. For example, applications need to be highly optimized for space, in order to fit in the limited memory on the mobile devices. Mobility brings additional uncertainties, as well as opportunities to provide new services and supplementary information to users in the locations where they find 22

themselves. In general, most application software, operating systems, and network infrastructures are intended for more conventional environments, and so the mobile, wireless user has great difficulty exploiting the computational infrastructure as fully as he or she might. There is an emerging consensus among researchers that a new architecture and dynamic infrastructure is an appropriate way to address this problem. Day by day as the standard of the mobile computing is increasing the boons of mobile computing are changing to banes. Eg: The most deadly terrorist attack occurred on sept 11, 2001.

7.APPLICATIONS:
New technical and application developments have established that mobile systems can be a cost-effective, efficient, and productive solution in several different types of application environments. They are:- a new generation of satellites, especially LowEarth Orbit systems (LEOS) are under development with the Internet in mind. Companies like Teledesic and Orbcomm are actively promoting Internet access. Vertical industries where mobile technology has already been successfully adopted include Consumer Goods, Delivery and Route Sales, Government, Healthcare, Market Research, Pharmaceuticals, Transportation, and Utilities.

Consumer Goods: Typical applications include inventory, merchandising, order entry, and sales automation. Features found in these applications usually provide access to stock and pricing information, monitor promotions, and perform shelf space analysis including number of facings and product age. Customer detail helps reps to act more as consultants than order takers.

Delivery & Route Sales: With fierce competition and an increasing inventory, having timely and accurate information is more important than ever.

23

Government: Applications center around assessments, inspections, and work orders. Most of these applications involve auditing some sort of facility or process (food service, restaurant, nursing home, child care, and schools, commercial and residential buildings).

Healthcare: The focus in this industry has been on automating patient records, medication dispension, and sample collection. A common goal is to leverage mobile computing in the implementation of positive patient identification.

Market Research: Automating the survey process has enabled these companies to get their data more accurately and quickly while being able to customize their queries at will.

Pharmaceuticals: In addition to the reps need to perform account management and call reporting functions, the FDAs requirement for physician signatures for all drug samples dispensed was an added complication that was eliminated through the use of mobile technology.

Transportation: Transforming freight damage inspections from paper to mobile computing greatly expedites the process and reduces costs by providing on-line preshipment inspections. This technology also offers a more efficient means of storing and transmitting maintenance inspection reports. In conjunction with GPS (global positioning systems), mobile computing allows companies to provide better customer service by being continually aware of exactly where any given shipment is when in transit.

Utilities: Eliminating the rekeying of data and providing a means to perform on site analysis are instrumental to an industry that is required to perform inspections on a routinebasis.

24

8. RESEARCH ISSUES:

Seamless connectivity over multiple overlays:


- Implementing low latency handoffs - Exploiting movement-tracking and geography - Performance characterization of channels - Authentication, security, privacy

Scalable mobile processing:


Hierarchical and distributed network management Load balancing for network mgmt & application support Integration with local- & wide-area networked servers - Application support for adaptive connections

Wireless Communications:
- Quality of connectivity - Bandwidth limitations

Mobility:
-Location transparency - Location dependency

Portability:
Power limitations, Display, processing, storage limitations

25

9.Wireless Internet Future:


There's more happening than many people suspect. The difficulty, though, is to provide the right network, the right device, the right price and the right applications. Wireless is not wired, and there are numerous advantages and disadvantages. The wireless industry "mindset" is different from the computer community's. These different philosophies produce what we call a "wireless-Web culture clash." Also, much of the information we obtain via the Internet isn't worth paying for in a mobile environment. The Internet will change is already changing the way mobile companies and computer companies offer products and services, and deal with customers. Indeed, many wireless subscribers will demand these changes, ranging from online customer service to electronic bill-paying to creating profiles that automatically transmit personalized information via the Internet to wireless devices.

We are in a period of tremendous change. It's mobile computing jungle where old technologies must evolve to survive and where proponents of new technologies are jockeying for dominance. It is a dangerous and exciting time where existing business models can crumble and more nimble, innovative companies can usurp established institutions. Uncovering these developments, analyzing their impact and recommending solutions to corporations is what Wireless Internet & Mobile Computing consulting is all about.

26

9. Conclusion:The world of personal computing is becoming more connected. The advent of the World Wide Web has caused an explosive growth in the population of Internet users. Everyday new members join the network community. It is changing the way we work, the way we think. Every day one reads another story about the ``global network'' and the way it is changing the world. Major computer companies have built entire advertising campaigns around this very idea, and the future promise of bringing it about. Providing on-line services to the home user has become a multi-million dollar business. The world of computing is becoming more interactive. The days of batch computing are all but gone. We have become used to, and have come to expect, quick response times. Even as we move to a more decentralized, remote model of computing our expectations stay the same. In fact, the spread of graphical interfaces and multimedia has only served to increase our expectations. The effect on the computing world of the graphical, multimedia based nature of the Web stands as testimony to this. The world of computing is becoming more mobile. Mobile computers are becoming smaller and more powerful everyday. However, people do not want to give up connectivity for mobility. With the more connected, more interactive, more mobile paradigm comes the need for the rapid transmission of programs from a remote server. The recent and continuing advances in network technology will help alleviate this problem by providing greater bandwidth, but network usage seems to always increase to fill the amount of bandwidth available. In addition, while network technology is improving rapidly, advances in wireless computing still lag far behind that of wire-based media. We also showed that the performance of the continuous compiler is strongly dependent on the design of various aspects of the compiler. Specifically, the strategy used to replace source code with native code and the order in which the translation from source code to native code is carried out both have a strong affect on performance.

27

This paper presents an analysis of the evolutionary path of mobile services, from early voice communication services to prospects of future service possibilities. Each of the concepts discussed around mobile services in this paper are on their own and of research and they must be further elaborated in separate studies. Thus, the discussions in this paper are preliminary and do address only the basic structures and further works will be carried out. In this paper, we have looked at issues related to portable devices, merits, demerits and applications in mobile environment.

REFERENCES:

ETSI, Digital cellular telecommunications system (Phase 2+); Specification of the SIM Application Toolkit (SAT) for the Subscriber Identity Module. Terri Watson. : Application design for wireless computing. Application design for wireless computing : M-Mail: A Case Study of Dynamic Application Partitioning in Mobile Computing Christine Julien and Gruia-Catalin Roman : Active Coordination in Ad Hoc Networks Raymond J. Brunsting : Quality of Service Issues in Wireless Networks www.mobilecomputing.com www.cs.washington.edu/research/mobicomp/mobile.html www.mobileplanet.com/us/ www.mobilecom.com www.engadget.com/tag/carputer/ www.geardiary.com/2007/10/07/the-fly-fusion-pentop-computer-review http\\:www.iitd.ac.in

28

29

You might also like