You are on page 1of 38

CSE 535 – Mobile Computing

Lecture 2: An Overview of Mobile


Computing: Part I – Motivation and
Challenges
Sandeep K. S. Gupta
School of Computing and
Informatics
Arizona State University
Agenda
 Introduction to Mobile Computing
 Introduction to Wireless Sensor Networking
and Applications
Mobile Computing
 The need for "information anywhere anytime" has been
a driving force for the increasing growth in Web and
Internet technology, wireless communication, and
portable computing devices.
 The field of mobile computing is the merger of these
advances in computing and communication with the
aim of providing seamless and ubiquitous computing
environment for mobile users.
 Mobile computing techniques are essential for enabling
distributed and net-centric applications which require
remote and ubiquitous information access.
3
Mobile Computing Challenges
 Mobile computing environments are characterized by
severe resource constraints and frequent changes in
operating conditions.
 This has led to many new and challenging problems
which span several areas of computer science such as
incorporation of support for mobility in network
protocols, development of efficient and adaptive
resource management techniques for wireless
bandwidth and battery power, predicting mobility
patterns, performance modeling and simulation of
mobile applications, and supporting mobile real-time
multimedia applications.
4
MC - Fundamentals
 Mobile Computing => Adaptive Computing and
Communication
 Cross-Layer approach is need for
 Adaptation
 Conserving resources such as energy
 Mobile computing is distinct from distributed
computing
 Mobile computing is an essential component of
Ubiquitous computing.
5
Mobility and Adaptability
1. Resource Poor
2. Less Secure
Mobile Systems ! ! Dynamic Adaptation
3. Poor Connectivity
4. Less Energy
Application
QoS
(re) negotitation
System
Fig: Dynamic Adaptation
6
Example Adaptive Approaches
 Approach 1: Combine solutions with different optimality
ranges/performance characteristics.
 Approach 2: Treat change in system state as a transient fault
and use the techniques of designing fault-tolerant protocols
 Approach 3: Dynamically monitor the system state and use the
solution which is suitable for the current system state.
 Many others - ….
7
Promises of Mobile Computing
 Global information services at any time from any
location
 Mobile users as integrated consumers and
producers of data and information
 Ubiquitous computing where mobile computers
become an integral part of daily activities
8
Mobile Applications
 Expected to create an entire new class of
Applications
 new massive markets in conjunction with the Web
 Mobile Information Appliances - combining personal
computing and consumer electronics
 Applications:
 Vertical: vehicle dispatching, tracking, point of sale,
information service (yellow pages), Law
enforcement
 Horizontal: mail enabled applications, filtered
information provision, collaborative computing…
9
Vertical Applications
 l Serve a narrow, niche application domain
 – Services dispatch (taxi, fire, police, trucking)
 – Sales tracking (point of sale, market trends)
 – Mail and package tracking (courier, postal)
 Relatively easy to implement due to
 restrictions and assumptions
 – homogeneous MUs
 – limited numbers of users
10
Horizontal Applications
 Broad, domain-independent applications serving a
mass-market
 – Electronic Mail and News
 – Yellow Pages Directory Services
 – Multimedia Merchant Catalogs
 – Digital Libraries
 – Location-based Information Filtering
 Driving force of mobile computing research
11
Medical Example
 911 Call
 Ambulance arrives/departs
 Closest hospital
 Access patient records
 Send vital signs
 Update patient records
 Page hospital personnel
 Order medical supplies
12
Party on Friday
 Update Smart Phone’s calendar with
guests names.
 Make a note to order food from Dinner-
on-Wheels.
 Update shopping list based on the
guests drinking preferences.
 Don’t forget to swipe that last can of
beer’s UPS label.
 The shopping list is always up-to-date.
13
Party on Friday
 AutoPC detects a near Supermarket that advertises
sales.
 It accesses the shopping list and your calendar on the
Smart Phone.
 It informs you the soda and beer are on sale, and
reminds you.
that your next appointment is in 1 hour.
 There is enough time based on the latest traffic report.
14
Party on Friday
 TGIF…
 Smart Phone reminds you that you need to order
food by noon.
 It downloads the Dinner-on-Wheels menu from
the Web on your PC with the guests’ preferences
marked.
 It sends the shopping list to your
CO-OP’s PC.
 Everything will be delivered by the time
you get home in the evening.
15
Wireless Networks
PDA
MOBILE HOST
WIRELESS LAN CELL
2Kbps - 15Mbps
BASE
STATION FIXED
BASE HOST
WIRELESS RADIO CELL
STATION
9Kbps - 14Kbps
FIXED NETWORK
BASE
STATION
Mbps to Gbps
BASE
STATION
PDA
16
Wireless Networks
 Cellular - GSM (Europe+), TDMA & CDMA (US)
 FM: 1.2-9.6 Kbps; Digital: 9.6-14.4 Kbps (ISDN-like services)
 Cellular Subscribers in the United States:
 90,000 in 1984; 4.4 million in 1990;
13 million in 1994; 120 million in 2000; 187.6 million by 2004
(Cahner In-State Group Report).
Handheld computer market will grow to $1.77 billion by 2002

 Public Packet Radio - Proprietary
 19.2 Kbps (raw), 9.6 Kbps (effective)
 Private and Share Mobile Radio
 Paging Networks – typically one-way communication
 low receiving power consumption
 Satellites – wide-area coverage (GEOS, MEOS, LEOS)
 LEOS: 2.4 Kbps (uplink), 4.8Kbps (downlink)
17
Wireless Networks (Cont.)
 Wireless Local Area Networks
 IEEE 802.11 Wireless LAN Standard based systems, e.g.,
Lucent WaveLan.
 Radio or Infrared frequencies: 1.2 Kbps-15 Mbps
 Packet Data Networks
 ARDIS
 RAM
 Cellular Digital Packet Data (CDPD)
 Private Networks
 Public safety, UPS.
18
Wireless Local Area Network
 Data services: IP packets
 Coverage Area: Offices, buildings, campuses
 Roaming: Within deployed systems
 Internet access: via LAN.
 Type of services: Data at near LAN speed.
19
Wireless Characteristics
 Variant Connectivity
 Low bandwidth and reliability
 Frequent disconnections
 predictable or sudden
 Asymmetric Communication
 Broadcast medium
 Monetarily expensive
 Charges per connection or per message/packet
 Connectivity may be weak, intermittent and expensive
20
Portable Information Devices
 PDAs, Personal Communicators
 Light, small and durable to be easily carried around
 dumb terminals [InfoPad, ParcTab projects],
palmtops, wristwatch PC/Phone, walkstations
 run on AA+ /Ni-Cd/Li-Ion batteries
 may be diskless
 I/O devices: Mouse is out, Pen is in
 wireless connection to information networks
 either infrared or cellular phone
 specialized HW (for compression/encryption)
21
Portability Characteristics
 Battery power restrictions
 transmit/receive, disk spinning, display, CPUs,
memory consume power
 Battery lifetime will see very small increase
 need energy efficient hardware (CPUs, memory) and
system software
 planned disconnections - doze mode
 Power consumption vs. resource utilization
22
Portability Characteristics
 Resource constraints
 Mobile computers are resource poor
 Reduce program size – interpret script languages (Mobile
Java?)
 Computation and communication load cannot be distributed
equally
 Small screen sizes
 Asymmetry between static and mobile computers
23
Mobility Characteristics
 Location changes
 location management - cost to locate is added to
communication
 Heterogeneity in services
 bandwidth restrictions and variability
 Dynamic replication of data
 data and services follow users
 Querying data - location-based responses
 Security and authentication
 System configuration is no longer static
24
What Needs to be Reexamined?
 Operating systems
 File systems
 Database systems
 Programming Languages
 Communication architecture and protocols
 Hardware and architecture
 Real-Time, multimedia, QoS
 Security
 Application requirements and design
25
Limitations of Wireless Sensors
 Wireless sensor nodes have many limitations:
 Modest processing power – 8 MHz
 Very little storage – a few hundred kilobits
 Short communication range – consumes a lot of
power
 Small form factor – several mm3
 Minimal energy – constrains protocols
 Batteries have a finite lifetime
 Passive devices provide little energy
Some Sample Applications
 Industrial and Commercial Uses
 Inventory Tracking – RFID
 Automated Machinery Monitoring
 Smart Home or Smart Office
 Energy Conservation
 Automated Lighting
 Military Surveillance and Troop Support
 Chemical or Biological Weapons Detection
 Enemy Troop Tracking
 Traffic Management and Monitoring
Sensor-Based Visual Prostheses
Retinal Implant Cortical Implant
Organization into Ad Hoc Networks
 Individual sensors are quite limited.
 Full potential is realized only by using a large
number of sensors.
 Sensors are then organized into an ad hoc
network.
 Need efficient protocols to route and manage
data in this network.
Why Wireless Sensors Now?
 Moore’s Law is making sufficient CPU performance available with
low power requirements in a small size.
 Research in Materials Science has resulted in novel sensing
materials for many Chemical, Biological, and Physical sensing
tasks.
 Transceivers for wireless devices are becoming smaller, less
expensive, and less power hungry.
 Power source improvements in batteries, as well as passive
power sources such as solar or vibration energy, are expanding
application options.
Typical Sensor Node Features
 A sensor node has:
 Sensing Material
 Physical – Magnetic, Light, Sound
 Chemical – CO, Chemical Weapons
 Biological – Bacteria, Viruses, Proteins
 Integrated Circuitry (VLSI)
 A-to-D converter from sensor to circuitry
 Packaging for environmental safety
 Power Supply
 Passive – Solar, Vibration
 Active– Battery power, RF Inductance
Wireless Sensor Nodes: Examples
Consider Multiple Generations of Berkeley Motes
Model Rene 1 Rene 2 Mica Mica 2
Date 10/2000 6/2001 2/2002 7/2003
CPU 4 MHz 8 MHz 4 MHz 4 MHz
Flash
8 KB 16 KB 128 KB 128 KB
Memory
SRAM 32 KB 32 KB 512 KB 512 KB
Radio 10 Kbps 10 Kbps 40 Kbps 40 Kbps
Historical Comparison
Consider a 40 Year Old Computer
Model Honeywell H-300 Mica 2
Date 6/1964 7/2003
CPU 2 MHz 4 MHz
Memory 32 KB 128 KB
SRAM ??? 512 KB
A Rosy Future for Wireless Sensors?
 Is the effort on wireless sensor protocols a
waste of time??
 Can we just wait 10-15 years until we have
sensors that are very powerful??
 NO!! Will still face:
 Very limited storage
 Modest power supplies
Traffic Management & Monitoring
 Future cars could use
wireless sensors to:
 Handle Accidents
 Handle Thefts
Sensors embedded
in the roads to:
–Monitor traffic flows
–Provide real-time
route updates
Conclusions
 Fundamental to Mobile computing is various
techniques in hardware/software to adapt to
variation in resource availability – taking into
account contextual information including user
preferences.
 Wireless sensor networking is enabling
technology for pervasive/ubiquitous computing
 Next Class - Continue discussion on
Adaptation techniques
 Read Chapter 1

You might also like