University of Cyprus



Similar documents
Wireless radio cell. Fixed Network

Computer Network. Interconnected collection of autonomous computers that are able to exchange information

C Information Systems for Managers Fall 1999

Introduction. Network Basics. Workstations. Server. Hub

For the purpose of setting up a home network, all you need to worry about are two major categories of components:

Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software

Discovering Computers Chapter 9 Communications and Networks

Getting Broadband. FCC Consumer Facts. What Is Broadband?

Overview of Network Hardware and Software. CS158a Chris Pollett Jan 29, 2007.

Chapter 9. Communications and Networks. McGraw-Hill/Irwin. Copyright 2008 by The McGraw-Hill Companies, Inc. All rights reserved.

Chapter 9A. Network Definition. The Uses of a Network. Network Basics

Wireless Local Area Network

Mobile and Sensor Systems

High-Speed Internet from U.S. Cellular. Positioning and Overcoming Objections

Bandwidth Primer The basic conditions and terms used to describe information exchange over networks.

Telecommunications, Networks, and Wireless Computing

Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction

What Is Broadband? How Does Broadband Work?

Wireless LAN Concepts

Heterogeneous network establishment assisted by cellular operators

;l ~~! I!July 1993 Doc: IEEE P /94a. Power Management. The importance of Power Management provisions in the MAC. By: Wim Diepstraten NCR.

Best Practices for Deploying Wireless LANs

Introduction Chapter 1. Uses of Computer Networks

Ad Hoc Mobile Networking and General Mobility Issues

Challenges for Nomadic Computing: Mobility Management and Wireless Communications

Wireless Home Network Setup. Dan Wenz Chris Kiscaden

CSIS CSIS 3230 Spring Networking, its all about the apps! Apps on the Edge. Application Architectures. Pure P2P Architecture

Mobile Access by Axis. Wireless Access Points

NETWORKING TECHNOLOGIES

Local-Area Network -LAN

The WestNet Advantage: -- Textbooks, ebooks, ecourses -- Instructor Resourse Center -- Student Resource Center

Introduction to Computer Networks and Data Communications

Introduction. Mobile GIS emerged in the mid-1990s to meet the needs of field work such as surveying and utility maintenance.

3 Software Defined Radio Technologies

Communications and Computer Networks

Wireless Broadband Access

2 Basic Concepts. Contents

EXAMPLES AND PROBLEMS. Competence Based Education Internet Protocols

Unit of Learning # 2 The Physical Layer. Sergio Guíñez Molinos sguinez@utalca.cl

1.264 Lecture 36 (Solutions)

Streamit s audio streaming solutions for dummies

WIRELESS IN THE METRO PACKET MICROWAVE EXPLAINED

Chapter 2 Configuring Your Wireless Network and Security Settings

MN-700 Base Station Configuration Guide

R2. The word protocol is often used to describe diplomatic relations. How does Wikipedia describe diplomatic protocol?

How do SMB benefit from using the Small but Secured Aries Server Appliance

Chapter 9 Communications and Networks

MANAGEMENT INFORMATION SYSTEMS 8/E

Wireless Ethernet LAN (WLAN) General a/802.11b/802.11g FAQ

Wireless Links - Wireless communication relies on radio signals or infrared signals for transmitting data.

Solstice and the Corporate Enterprise Network. Media Sharing and Collaboration Over Existing IP Infrastructure

LIVE VIDEO STREAMING USING ANDROID

Wireless (Select Models Only) User Guide

CS 5480/6480: Computer Networks Spring 2012 Homework 4 Solutions Due by 1:25 PM on April 11 th 2012

communication over wireless link handling mobile user who changes point of attachment to network

Wireless e-business by IBM Wireless Local Area Networks

Chapter 6 Telecommunications, Networks, and Wireless. Computing

Challenging Issues and Limitations of Mobile Computing

PCMCIA Wireless LAN Card User s Manual

Packetized Telephony Networks

Data Transmission. from one person or place to another. person or place to another of passing something

Computer Networking: A Survey

LTE, WLAN, BLUETOOTHB

Ethernet. Ethernet. Network Devices

Frame Burst Adjusting for Transmitting Video Conference in Gigabit Ethernet

Understand VLANs, Wired LANs, and Wireless LANs

Protocols. Packets. What's in an IP packet

Voice over IP Basics for IT Technicians

Narrowband and Broadband Access Technologies

Making the Case for Satellite: Ensuring Business Continuity and Beyond. July 2008

CTS2134 Introduction to Networking. Module 07: Wide Area Networks

Wireless Network Policy

Computer Networks. Definition of LAN. Connection of Network. Key Points of LAN. Lecture 06 Connecting Networks

Cisco Mobile Network Solutions for Commercial Transit Agencies

CHAPTER 1 1 INTRODUCTION

Introduction Page 2. Understanding Bandwidth Units Page 3. Internet Bandwidth V/s Download Speed Page 4. Optimum Utilization of Bandwidth Page 8

EECS 122: Introduction to Computer Networks Multiaccess Protocols. ISO OSI Reference Model for Layers

Wireless Encryption Protection

White Paper. D-Link International Tel: (65) , Fax: (65) Web:

Security in Ad Hoc Network

Professor Yashar Ganjali Department of Computer Science University of Toronto.

ADDENDUM 12 TO APPENDIX 8 TO SCHEDULE 3.3

Random Access Protocols

11Mbps Wireless LAN PC Card. User s Manual

Computer Networks. Wireless and Mobile Networks. László Böszörményi Computer Networks Mobile - 1

what does it mean for the mobile professional?

Chapter 7 Low-Speed Wireless Local Area Networks

Module 5. Broadcast Communication Networks. Version 2 CSE IIT, Kharagpur

Wireless Threats To Corporate Security A Presentation for ISACA UK Northern Chapter

Ethernet Radio Configuration Guide

Analysis of Methods for Mobile Device Tracking. David Nix Chief Scientific Advisor

Wireless LANs vs. Wireless WANs

Building Wireless Networks. Tariq Hasan Regional Sales Manager, MENA Wireless Network Solutions Motorola Solutions

EPL 657 Wireless Networks

CDMA-based network video surveillance System Solutions

Dell NetReady Mobile Broadband Service User's Guide

Wireless (Select Models Only) User Guide

Voice over IP (VoIP) Basics for IT Technicians

IEEE Broadband Wireless Access Working Group. ATM Based MAC Layer Proposal for the Air Interface Specification

Transcription:

University of Cyprus Computer Science Department Data Management for Mobile Computing Introduction 1

Introduction = Mobile or nomadic computing = Wireless = Ubiquitous = Personal Architecture 2

Key Issues: Mobility, Wireless Communications, and Portability [7, 2, 4, 1] Mobility The location of mobile elements and therefore their point of attachment to the fixed network change as they move. The consequences of mobility are numerous. = The configuration of a system that includes mobile elements is not static. Thus, 1. In designing distributed algorithms, we can no more rely on a fixed topology. 2. The center of activity, the system load, and locality change dynamically. = Location management 1. The search cost to locate mobile elements is added to the cost of each communication involving them. 2. Efficient data structures, algorithms, and query execution plans must be devised for representing, managing, and querying the location of mobile elements, which is a fast changing data. 3

Mobility (continued) = Heterogeneity 1. Connectivity becomes highly variant in performance and reliability. For instance, outdoors, a mobile client may have to rely on low and width networks, while inside a building it may be offered reliable highbandwidth connectivity or even operates connected via wireline connections. Moreover, there may be areas with no adequate coverage resulting in disconnections of various durations. 2. The number of devices in a network cell changes with time, and so do both the load at the base station and bandwidth availability. 3. There may be also variability in the provision of specific services, such as in the type of available printers or weather reports. 4. The resources available to a mobile element vary, for example, a docked computer has more memory or is equipped with a larger screen. Mobility also raises very important security and authentication issues. 4

Wireless Medium = (Weak and Intermittent Connectivity) Wireless networks are more expensive, offer less bandwidth, and are less reliable than wireline networks. Wireless communications face many obstacles because the surrounding environment interacts with the signal. Thus, while the growth in wired network bandwidth has been tremendous (in current technology Ethernet provides 10 Mbps, FDDI 100 Mbps and ATM 155 Mbps), products for wireless communication achieve only 19 Kbps for packet radio communications, and 9-14 Kbps for cellular telephony. The typical bandwidth of wireless LANs ranges from 250 Kbps to 2 Mbps and it is expected to increase to 10 Mbps [5]. Since the bandwidth is divided among the users sharing a cell, the deliverable bandwidth per user is even lower. For radio transmission the error rate is so high that the effective bandwidth is limited to less than 10 Kbps [6]. Thus, bandwidth is a scarce resource. Furthermore, data transmission over the air is currently monetarily expensive [3]. Mobile elements may voluntary operate disconnected. 5

Wireless Medium (continued) = (Variant Connectivity) Wireless technologies vary on the degree of bandwidth and reliability they provide. = (Broadcast Facility) There is a high bandwidth broadcast channel from the base station to all mobile clients in its cell. = (Tarrifs) For some networks (e.g., in cellular telephones), network access is charged per connection-time, while for others (e.g., in packet radio), it is charged per message (packet). 6

Portability of Mobile Elements = Mobile elements are resource poor when compared to static elements. Mobile elements must be light and small to be easily carried around. Such considerations, in conjunction with a given cost and level of technology, will keep mobile elements having less resources than static elements, including memory, screen size and disk capacity. This results in an asymmetry between static and mobile elements. = Mobile elements rely on battery. Even with advances in battery technology, this concern will not cease to exist. Concern for power consumption must span various levels in hardware and software design. Mobile elements are easier to be accidentally damaged, stolen, or lost. Thus, they are less secure and reliable than static elements. 7

Summary Characteristics of mobile elements Frequent disconnections Predictable disconnections Physical support for broadcast Asymmetry Monetarily expensive Relatively unreliable High bandwidth variability Low bandwidth Characteristics of wireless communications Limited resources: Limited memory Limited computational power Small screen Limited battery life Relatively unreliable Variability in resources Frequent location updates Network Disconnections Voluntary or forced Predictable or sudden. Short disconnections and long Disconnected operation 8

An Example Satya's vision of a hypothetical trip in the year 2000 [8]: Imagine you are sitting at your office working on a report stored in a shared file system. Soon, it is time to leave. You use your machine to call for a taxi. You continue working as necessary files are prefetched in your notebook. When the taxi arrives, you pick up your notebook and leave. On the ride to the airport, you continue working. Your notebook recognizes that it is no longer on a LAN, but continues communicating via a cellular modem. There are some gaps in communication, but they remain completely transparent to you. You finish editing, save the file, and send email to your coauthor. At the airport, while waiting for boarding, you use your notebook for web - browsing. While on board, you start working on your slides. Although each seat is equipped with an outlet for air-to-ground telephone service, your notebook discovers that telephone charges are very high. Thus, it wisely decides to let you operate disconnected and defer all communication. Your requests for some old figures are also postponed for later service. When you arrive at your hotel room, your notebook discovers that the hotel's late-night telephone charges are low. It therefore propagates the changes you have made so far, fetches new versions of the files you had cached, and picks up your mail and the figures you have requested. 9

An Example (continued) Next morning, you present your talk. Your notebook senses the presence of a large wall-sized display and shows your slides on it through an infrared link. Since your talk is about a new piece of user-interface software, your are able to give a live demo of it using your notebook. Next day, you decide to do some sightseeing and rent a car. The car is provided with a navigating interactive screen map that you use to tour the city. The map is intelligent enough to avoid traffic jams by listening to periodically broadcasted traffic information. When you arrive, you grab your notebook that downloads a guided tour of the site. As you walk around, a video describing the features of the site is seen and the accompanying commentary is heard. Before leaving, you purchase a t-shirt at the gift shop. The store clerk obtains your travel itinerary from your notebook and arranges for your duty free purchase to be delivered to the correct gate. Next morning you take the metro to the airport. On the metro, you use your notebook to watch CNN. From time to time, as the train goes through regions of poor reception, the displayed image degenerates from full-motion to slow-scan black and white. When you arrive at the airport, you pick up your gift at the gate. During the flight you can relax: your notebook has been recording your purchases and is now automatically preparing an expense report to be transmitted to your secretary for reimbursement. 10

References [1] R. Alonso and H. F. Korth. Database System Issues in Nomadic Computing. In Proceedings of the 1993 SIGMOD Conference, Washington, D.C., May 1993. [2] G. H. Forman and J. Zahorjan. The Challenges of Mobile Computing. IEEE Computer, 27(6): 38-47, April 1994. [3] D. Hayden. The New Age of Wireless. Mobile Office, May 1992. [4] T. Imielinksi and B. R. Badrinath. Wireless Mobile Computing: Challenges in Data Management. Communications of the ACM, 37(10), October 1994. [5] C. J. Mathias. New LAN Gear Snaps Unseen Desktop Chains. Data Communications, 23(5): 75-80, March 1994. [6] K. Miller. Cellular Essentials for Wireless Data Transmission. Data Communications, 23(5): 61-67, March 1994. [7] M. Satyanarayanan. Fundamental Challenges in Mobile Computing. In Proceedings of the 15th ACM Symposium on Principles of Distributed Computing, Philadelphia, PA, May 1996. [8] M. Satyanarayanan. Mobile Information Access. IEEE Personal Communications, 3(1), February 1996. 11