Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Standard view
Full view
of .
Look up keyword
Like this
0 of .
Results for:
No results containing your search query
P. 1
Mobile device infrastructure

Mobile device infrastructure

Ratings: (0)|Views: 35|Likes:
Published by Dwiti Das

More info:

Published by: Dwiti Das on May 02, 2011
Copyright:Attribution Non-commercial


Read on Scribd mobile: iPhone, iPad and Android.
download as DOC, PDF, TXT or read online from Scribd
See more
See less





Mobile technology is usage of portable devices such as laptops, netbook computers, smart phones, PDAs, GPS systems and credit/debit card payment terminals. Mobile devices enableusage of communications technologies while motion. Virtual networks provide secure accessto private networks within organizations.Software applications used on mobile devices areoffice applications, web browsers and other office applications
(Allman, Paxon, 1999)
. Sincehardware components in portable computer are low powered, they need applications whichare not very demanding to provide an ideal experience. Thus, the infrastructure must look for applications that work well on mobile devices and increase user efficiency even when theyare in motion. (
Acharya, Badrinath, 1996)
.Developing a new infrastructure to support mobile learning represents a significant challenge.The requirements include (
Badrinath, Fox, Popek, 2000)
an authentication system
content management functions
design system / tools for developers
mobile web siteThe ideal solution is a system that allows access on any device. Developing entire infrastructurefor mobile devices on all platforms is a challenge. However, a supplementary storageinfrastructure (SSI) could be developed. The advantages of SSI are (
Allman, Paxon, 1999)
Uses a simple and robust, standard web server technology
Optional content management system to simplify use for content developers
Relatively quick to install and implement
Allows sharing of content across modules
Access from any web device (e.g. PC or mobile)
Supports the trend for open content
This approach provides the opportunity use open content bandwagon. The SSI server isconfigured to deliver content to users having a valid user account, allowing materials to be protected by user authentication. This enables only the authorized employees to view classifiedinformation within the organization (
Badrinath, Fox, Popek, 2000)
.The infrastructure requires changes in every layer of the system to authenticate users, allowremote access, view reports on the internal database and other services. The most importantchanges required will be:
Alterations to IP – packets are forwarded by routers using tables which are indexed bythe IP address of the destination devices (H.Wada, 1993). As the devices are low powered,tables must have manageable size. IP address of same prefix is aggregated on these devices(H.Wada, 1993).
The use of Mobile IP updates tables from a single mobile device which shifts location onthe assumption that infrastructure routers will be available nearby. “On Demand” networkswhich have dynamically changing topologies, maintenance of routing tables is difficult.Hence new routing protocols must be developed (
Balakrishnan, Amir, Katz, 1995)
A content-based network can be used. It is a network having content based on wirelessservice model. Messages are delivered to host as per the interests declared instead of adestination address used by the sender. Explicit addresses are not needed in content-basednetworks. Each host is associated with a
receiver predicate
. It is a logical expression onmessage content which specifies the messages users wants to receive. Messages areintroduced into the network. As a result, the message is sent to every host which hasexplicitly shown interest in the message (
Bhattacharya, Das, 1999)
The wireless mobile network is more dynamic and difficult than the wired Internet andsimple single-hop models add further complexity. Managing requires more functionality thanany wired environment during handoffs and other issues. Few management services for theinfrastructure are:
adding /removing mobile nodes into a network 
determine status of particular nodes
 probe routing tables and other shared network data structures
determine link conditions at various points
ability to filter/trace attack packets
diagnosis tools for pinpointing network problems
ability to configure network overlays
Manage networks as per resource availability at particular nodes (Border, Kojo,Shelby, 2001)
Adaptation services such as proxy nodes on boundary twixt wired and wireless network should be employed. Protocols having adaptive capabilities, single link or gateway servicescan be a few breakthrough services. The adaptive infrastructure model requires sophisticatedinfrastructure dealing with issues of security, reliability and composition of services(
Carzaniga, Rosenblum, Wolf, 2000)
Service Discovery - enables computers to find services in an unfamiliar network is aninfrastructure component. The computer should know which applications are available andhow they can be accessed in a dynamic wireless environment (
Morash, Clinton, 1998)
Costs are involved to set up equipment and train to utilize more of mobile devices. Mobile ITdevices can reveal valuable data to unauthorized people in case proper precautions are nottaken to make sure the devices and accessed data are kept safe. To achieve mobility performance has to be traded for power and weight(Marsh, Douglis, 1993). To cross physical boundaries network reconfiguration has to provide consistent network access. Tocross administrative boundaries application reconfiguration has to allow applications to uselocal services and maintain security concerns (
Alter S., 1999)
.The mobile devices need applications such as Information browsing, Personal communications,Multi-person interaction and Data entry. To run these applications smoothly, mobile devices

You're Reading a Free Preview

/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->