Ch 1. Mobile Adaptive Computing Myungchul Kim

Slides:



Advertisements
Similar presentations
Interaction model of grid services in mobile grid environment Ladislav Pesicka University of West Bohemia.
Advertisements

Chapter 17 Networking Patricia Roy Manatee Community College, Venice, FL ©2008, Prentice Hall Operating Systems: Internals and Design Principles, 6/E William.
Q-MPEG V.2: A MPEG Video System with Quality of Service Control in Human Perspective Nature and Significance of the Project Q-MPEG is a Windows-based client-server.
1.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 1: Introducing Windows Server.
IT 644: Mobile Computing Instructor: Sridhar Iyer Course Page Lecture Hours Tue:
Distributed Storage March 12, Distributed Storage What is Distributed Storage?  Simple answer: Storage that can be shared throughout a network.
Overview of Mobile Computing (3): File System. File System for Mobile Computing Issues for file system design in wireless and mobile environments Design.
Web Caching Schemes1 A Survey of Web Caching Schemes for the Internet Jia Wang.
Chapter 15 – Part 2 Networks The Internal Operating System The Architecture of Computer Hardware and Systems Software: An Information Technology Approach.
Protocols and the TCP/IP Suite
Nasca Internet Ch. 5Internet Ch. 8 Networking and Security Ch. 6 Networking and Security Ch. 8.
Hands-On Microsoft Windows Server 2003 Networking Chapter 1 Windows Server 2003 Networking Overview.
What is adaptive web technology?  There is an increasingly large demand for software systems which are able to operate effectively in dynamic environments.
.NET Mobile Application Development Introduction to Mobile and Distributed Applications.
Mobile Data Sharing over Cloud Group No. 8 - Akshay Kantak - Swapnil Chavan - Harish Singh.
Client-Server Computing in Mobile Environments
Agile Application-Aware Adaptation for Mobility Khaled Hadi ICS243F Odyssey.
Lecture slides prepared for “Business Data Communications”, 7/e, by William Stallings and Tom Case, Chapter 8 “TCP/IP”.
MCTS GUIDE TO MICROSOFT WINDOWS 7 Chapter 14 Remote Access.
Protocols and the TCP/IP Suite Chapter 4. Multilayer communication. A series of layers, each built upon the one below it. The purpose of each layer is.
CLIENT A client is an application or system that accesses a service made available by a server. applicationserver.
Self-Organizing Adaptive Networks Hari Balakrishnan MIT Laboratory for Computer Science
Chapter 2 Architectural Models. Keywords Middleware Interface vs. implementation Client-server models OOP.
Adaptation for Mobile Data Access (DM1 & PL1) Yerang Hur Mar. 24, 1998.
Chapter 17 Networking Dave Bremer Otago Polytechnic, N.Z. ©2008, Prentice Hall Operating Systems: Internals and Design Principles, 6/E William Stallings.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter Four Configuring Outlook and Outlook Web Access.
What is a Protocol A set of definitions and rules defining the method by which data is transferred between two or more entities or systems. The key elements.
CORE KAIST EECS Computer Engineering Research Lab A General Purpose Proxy Filtering Mechanism Applied to the Mobile Environment Bruce Zenel Jupyung Lee.
VPN Protocol What is a VPN? A VPN is A network that uses Internet or other network service to transmit data. A VPN includes authentication and.
THE OSI MODEL AND THE TCP/IP PROTOCOL SUITE CS 1202 Lectur3 part2.
M i SMob i S Mob i Store - Mobile i nternet File Storage Platform Chetna Kaur.
Networks – Network Architecture Network architecture is specification of design principles (including data formats and procedures) for creating a network.
What makes a network good? Ch 2.1: Principles of Network Apps 2: Application Layer1.
Chapter 1 Lecture 2 By :Jigar M Pandya WCMP 1. Architecture of Mobile Computing The three tier architecture contains the user interface or the presentation.
Module 4: Designing Routing and Switching Requirements.
COT 4600 Operating Systems Fall 2009 Dan C. Marinescu Office: HEC 439 B Office hours: Tu-Th 3:00-4:00 PM.
Computer Networks. Introduction Computer Network2 A History Lesson of Networking 1969 – ARPANET, first packet switched network consist of UCLA, Stanford,
1 Mobile ad hoc networking with a view of 4G wireless: Imperatives and challenges Myungchul Kim Tel:
FLOOR CANDY.
1 Networking Chapter Distributed Capabilities Communications architectures –Software that supports a group of networked computers Network operating.
Ch 1. Computer Networks and the Internet Myungchul Kim
1 End-user Protocols, Services and QoS. 2 Layering: logical communication application transport network link physical application transport network link.
A.Obaid - Wilfried Probst - Rufin Soh INE4481 DISTRIBUTED DATABASES & CLIENT-SERVER ARCHITECTURES1 Chapter 1. Distributed systems: Definitions, design.
Chapter 15 – Part 2 Networks The Internal Operating System The Architecture of Computer Hardware and Systems Software: An Information Technology Approach.
OS Services And Networking Support Juan Wang Qi Pan Department of Computer Science Southeastern University August 1999.
Rehab AlFallaj.  OSI Model : Open system Interconnection.  is a conceptual model that characterizes and standardizes the internal functions of a communication.
A Utility-based Approach to Scheduling Multimedia Streams in P2P Systems Fang Chen Computer Science Dept. University of California, Riverside
Feb 5, ECET 581/CPET/ECET 499 Mobile Computing Technologies & Apps Data Dissemination and Management 2 of 3 Lecture 7 Paul I-Hai Lin, Professor Electrical.
© Chinese University, CSE Dept. Distributed Systems / Distributed Systems Topic 1: Characterization of Distributed & Mobile Systems Dr. Michael R.
Lecture 6 Networked Systems Network Operating Systems Introduction to Sockets HTTP – FTP – TCP - UDP Client-Server Model.
6.894: Distributed Operating System Engineering Lecturers: Frans Kaashoek Robert Morris
1 Protocol Layering Myungchul Kim Tel:
Understand Internet Security LESSON Security Fundamentals.
January 10, ECET 581/CPET/ECET 499 Mobile Computing Technologies & Apps Introduction to Mobile Computing & Technologies Lecture 1 Paul I-Hai Lin,
KAIS T System Support for Mobile, Adaptive Applications Brian Noble, University of Michigan Presented by Hyeeun Choi.
Ch 2. Application Layer Myungchul Kim
1 Wireless World Wide Web: Mobile Access to Web Resources 王讚彬 台中教育大學資訊系.
Distributed Systems Architecure. Architectures Architectural Styles Software Architectures Architectures versus Middleware Self-management in distributed.
SURENDRA INSTITUTE OF ENGINEERING & MANAGEMENT PRESENTED BY : Md. Mubarak Hussain DEPT-CSE ROLL
Network Processing Systems Design
Vocabulary Prototype: A preliminary sketch of an idea or model for something new. It’s the original drawing from which something real might be built or.
Adaptability—The Key to Mobile Computing
Understanding the OSI Reference Model
Adaptability—The Key to Mobile Computing
Chapter 3: Windows7 Part 4.
Chapter 2 Introduction Application Requirements VS. Transport Services
Mobile Computing.
IS 4506 Server Configuration (HTTP Server)
Communication.
Presentation transcript:

Ch 1. Mobile Adaptive Computing Myungchul Kim

2 o Mobile computing? – Distributed system – Wireless communications – Mobility of communications devices o Difference between mobile computing and mobile communications? – Ex. “Italian restaurant” through search engine. – Ex. Video streaming over the Internet – Limitations of mobile computing devices: energy, screen, … – Security or privacy – Middleware layer What is Mobile Computing

3 o The vision of mobile computing – Roam seamlessly with your computing devices while continuing to perform computing and communication tasks uninterrupted. o Transparency – The ability of a system to hide some characteristics of its underlying implementation from users – Access transparency – Location transparency: name transparency, user mobility – Failure transparency – Mobile computing: mobility transparency Adaptability – The key to Mobile Computing

4 o Constraints of mobile computing environments – Mobile computers can be expected to be more resource-poor than their static counterparts: e.g., battery – Mobile computers are less secure and reliable. – Mobile connectivity can be highly variable in terms of its performance (bandwidth and latency) and reliability. o Fig 1.1

5 o Application-aware adaptation – Application-transparent (the system is fully responsible for adaptation) – Laissez-faire (the system provides no support at all) – E.g., bandwidth, battery – Fig 1.2

6 o What can be adapted? – The functionality and the data o How to adapt? – Client-server (CS) model o Adapting functionality – CS model – A server with soft or hard state about the clients – Coda File servers (Saty 1996a)  A few trusted servers act as the permanent safe haven of the data.  A large number of un-trusted clients can efficiently and securely access the data.  Good performance is achieved by using techniques such as caching and prefetching.  Security of data is ensured by employing end-to-end authentication and encrypted transmissions. Mechanisms for Adaptation

7 – Impact of mobility on the CS model: a resource-poor mobile client = thin clients o Adapting data – Fidelity: the degree to which a copy of data presented for use at the client matches the reference copy at the server.  Video data – frame rate and image quality  Spatial data – minimum feature size  Telemetry data – sampling rate and timeliness – QoS requirements  Information quality  Performance – Agility: the speed and accuracy with which an adaptive application detects and responds to changes in its computing environments, e.g., change in resource availability.

8 o Software sensors – e.g., TCP’s congestion control o Coda (continued data availability) distributed file system – Coda client (called Venus) maintains a local cache. – Hoarding: the client prefetches files from the server to store locally. – Emulating: read and write access to local files – Write-disconnected: whether to fetch files from the server or to allow local access – Reintegration: the log of operation is used. How to develop or incorporate adaptations in applications

9 – Fig 1.3

10 o What can adaptations be performed? – Proxy: an intermediate software entity – Adapting to the hw/sw capabilities of the mobile device – e.g., security firewalls, NAT, transcoding proxies

11 – Fig. 1.4

12 o WebExpress – Fig. 1.6

13 – Caching – Differencing: for common graphic interface processing – Protocol reduction: reduction of TCP/IP connection overhead using virtual sockets. – Reduction of HTTP headers: e.g., MIME

14 o Odyssey [Noble 1997] – Between application and the operating system in handing the presence of wireless links – Network bandwidth drops -> Odyssey informs the video, audio, and other applications of the change -> proper adaptations in network usage – When network conditions change, the os notifies the application of what has happened. Support for building adaptive mobile applications

15 o Rover [Joseph 1995] – Object-based sw toolkit for developing both mobility-aware and mobility-transparent CS distributed applications – Relocatable dynamic objects(RDO): loadable dynamically from the server to the client – Queued Remote Procedure Call (QRPC): nonblocking rpc supporting split-phase operations – Optimize use of expensive links – Make use of asymmetric links – Stage messages near the destination