0% found this document useful (0 votes)
14 views88 pages

CST476 Mobile Computing 1

The document provides an overview of mobile computing, highlighting its advancements, user mobility, and device portability. It discusses the functions and architecture of mobile computing, including middleware and gateways, as well as various applications and services tailored to users' lifestyles. Additionally, it emphasizes the importance of ubiquitous networks for seamless connectivity and data transmission across different devices and locations.

Uploaded by

loooheyya
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
14 views88 pages

CST476 Mobile Computing 1

The document provides an overview of mobile computing, highlighting its advancements, user mobility, and device portability. It discusses the functions and architecture of mobile computing, including middleware and gateways, as well as various applications and services tailored to users' lifestyles. Additionally, it emphasizes the importance of ubiquitous networks for seamless connectivity and data transmission across different devices and locations.

Uploaded by

loooheyya
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 88

MODULE 1

CST476 Mobile Computing


1
Introduction

• Ubiquitous Connectivity: Advancements in cellular communication,


wireless LANs, and satellite services ensure universal access to information.
• Mobile Computing Environment: Most mobile devices will feature wireless
connections to fixed networks, enabling seamless connectivity and
unrestricted mobility.
• Nomadic Computing: Users are no longer bound to fixed network
positions, fostering a mobile computing environment that facilitates
on-the-go accessibility.
• New Application Landscape: Mobility and portability promote the
development of a new class of applications tailored for mobile users.
• Market Opportunities: The convergence of personal computing and
consumer electronics in mobile computing opens doors to new markets
and innovations.

CST476 Mobile Computing 2


Mobile Computing

Mobile computing is a technology that allows transmission of data,


via a computer, without having to be connected to a fixed physical
link.
• Mobile Voice Communication: Widely established worldwide,
experiencing rapid subscriber growth in cellular networks.
• Mobile Data Communication: Crucial and fast-evolving technology
enabling data transmission from remote to fixed locations.
• Mobile Computing is an umbrella term used to describe technologies
that enable people to access network services anyplace, anytime, and
anywhere.

CST476 Mobile Computing 3


2 aspects of mobile computing

User Mobility: Users can communicate "anytime, anywhere, with


anyone," accessing telecommunication services across different
locations, enabling mobility while services remain accessible.
Device Portability: Devices can connect to the network anywhere,
anytime, even while in motion, necessitating network and device
mechanisms to ensure uninterrupted communication.

CST476 Mobile Computing 4


Different names of mobile computing in
different context
• VHE – Virtual Home Environment
• Anywhere, anytime information
• Nomadic
• Pervasive computing
• Ubiquitous computing
• Global service
• Wearable computers

CST476 Mobile Computing 5


Functions of Mobile Computing
1. User Mobility: The user should be able to move from one
physical location to another and use the same service. The
service could be in a home or remote network.
2. Network Mobility: Network mobility deals with two types of
use-cases. In one use-case, the user is moving from one
network to another and uses the same service seamlessly, An
example could be a user moving from a WiFi network within
the university campus and changing to 3G/4G outside
continues using the same online service without
disruption.This seamless transition ensures consistent
connectivity and service delivery regardless of the network
environment. In the second use-case of network mobility, the
scenario involves a user maintaining connectivity while their
access point changes within the same network infrastructure

CST476 Mobile Computing 6


3.Bearer Mobility: The user should be able to move from one bearer
to another and use the same service. An example could be a user
using a service through WAP bearer in his home network in
Bangalore. He moves to Coimbatore where WAP is not supported and
switches over to the voice or SMS (short message service) bearer to
access the same application.

4.Device Mobility: The user should be able to move from one device
to another and use the same service. An example could be sales
representatives using their desktop computer in their home office.
During the day while they are on the street they would like to use
their Palmtop to access the application.
5. Session Mobility: A user session should be able to move from one
user-agent environment to another. A user watching a video on their
smartphone during a train ride can seamlessly switch to their laptop
upon reaching their office. The paused video session transitions from
the smartphone to the laptop, enabling the user to resume watching
the video uninterrupted.
CST476 Mobile Computing 7
6.Agent Mobility: The user-agent or the applications should be able to
move from one node to another In various computing contexts like
Cloud Computing, software entities such as aglets, crawler software,
and even malicious software like worms or viruses move freely
between different nodes, while in Cloud Computing, applications
seamlessly transition between platforms and infrastructures based
on temporal and economic factors, without being fixed to any specific
host.
7.Host Mobility: The user device can be either a client or server.
When it is a server or host, some of the complexities change. In case
of host mobility, mobility of the IP needs to be taken care of.

CST476 Mobile Computing 8


The mobile computing functions can be logically
divided into following segments

CST476 Mobile Computing 9


The mobile computing functions can be logically
divided into following major segments
•User with device: this could be a fixed device or a portable
device
•Network:Whenever a user is mobile, he will use different
networks(CDMA,GSM…) at different locations at different
times
•Gateway: This acts as an interface between different
transport bearers. These gateways convert one specific
transport bearer to another.
• Middleware: Functionality responsible for managing content
presentation and rendering on specific devices, with optional
capabilities for security and user personalization.
•Content: it is the domain where the origin server and content
is

CST476 Mobile Computing 10


Mobile Computing Devices
Device an be either a computing device or a communication
device.
Device Components:
•The device combines hardware and software, with the
hardware referred to as User Equipment (UE).
•Software within the UE acts as a User Agent (UA),
facilitating connection to remote services.
•A common UA example is a Web browser.
Role of HCI:
•Human-Computer Interaction (HCI) is crucial for
effectiveness, efficiency, and user experience.
•HCI becomes particularly vital as mobile devices shrink
and impose restrictions on information presentation, data
entry, and dialogue control.
HCI Challenges: The interaction should be
•Consistent Across Devices
•Adaptability to specific device and the Environment

CST476 Mobile Computing 11


MIDDLEWARE AND GATEWAYS
Middle ware is the software layered between a user application and
operating system.
• Examples are communication middleware, object-oriented middleware,
message-oriented middleware, transaction processing middleware,
database middleware etc…

CST476 Mobile Computing 12


In a mobile computing context we need different types of middleware
components and gateways at different layers of the architecture
1. Communication middleware.
2. Transaction processing middleware,
3. Behavior management middleware,
4. Communication gateways.

CST476 Mobile Computing 13


1.Communication middleware.

• The application will communicate with different nodes and services


through different communication middleware.
• Different connectors for different services will fall in this category.
• Examples could be TN3270 for IBM mainframe services, or Java mail
connector for IMAP or POP3 services.

CST476 Mobile Computing 14


2. Transaction processing middleware
•Transaction processing middleware refers to software
components that facilitate transactional operations (such
as data retrieval, updates, and synchronization) between
mobile devices and backend systems or databases.
•Session-Oriented Dialogue (SoD): Services operate with
SoD, maintaining a state over the stateless Internet using
application servers.
•Session-Less Dialogue (SlD): Some devices demand SlD,
comprising short, stateless transactions. In cases where
the backend offers SoD but the device requires SlD, a
middleware converts SoD to SlD.
•This middleware not only facilitates the conversion of
dialogue types but also handles the management of web
components in the transaction processing environment.

CST476 Mobile Computing 15


3. Behavior management middleware,

•Different devices deliver differently. We can have


applications which are developed specially to
deliver in a certain manner, For example, we can
have one application for the Web, another for
WAP, and a different one for SMS.
•This middleware will identify the device properly
and handle all device-specific rendering
independent of the application

CST476 Mobile Computing 16


4.Communication gateways.

• Between the device and the middleware there will be a system of


networks. Gateways are deployed when there are different transport
bearers or networks with dissimilar protocols.
• For example, we need an IVR gateway to interface Voice with a
computer, or a WAP gateway to access Internet over a mobile
phone.

CST476 Mobile Computing 17


CST476 Mobile Computing 18
APPLICATION AND SERVICES

• Applications and services in the mobile computing space primarily


run on the origin server, also known as content servers.
• Content served is often lifestyle-specific, catering to various aspects
of users' daily lives.
• Also, lifestyles change during the day.
• One individual can be an executive needing the corporate MIS
(Management Information System) application during the day while
at home the same individual can use applications related to lifestyle
or entertainment.

CST476 Mobile Computing 19


Different types of applications and services based on life style
1. Personal: Belongs to the user (wallet, medical records,
diary).
2. Perishable: Time-sensitive and of relevance and passes
quickly (general news,breaking news, weather, sports,
business news, stock quotes).
3. Transaction-oriented: Transactions need to be closed
(bank transactions, utility bill payment, mobile shopping).
4. Location-specific: Information related to current
geographical location (street direction map, restaurant
guide).
5. Corporate: Corporate business information {mail,
Enterprise Requirements Planning (ERP), inventory,
directory, business alerts, reminders}.
6. Entertainment: Applications for fun, entertainment. Social
networking sites like Facebook can be part of this category.

CST476 Mobile Computing 20


Examples….

•News: Political, current affairs, business, sports, and


community news accessible on the go.
•Youth: Message-based applications like messaging,
chat, forums, and dating catering to the youth.
•Weather: Notification services providing weather
updates for travelers and safety during natural
calamities.
•Corporate Applications: Access to corporate mail,
address book, appointments, MIS applications, and
corporate ERP for mobile workers.
CST476 Mobile Computing 21
Examples….

• Sales Force Automation: Applications for sales personnel including


order bookings, inventory inquiries, and shipment tracking.
• M-Broker: Stock-related applications for timely information and
online trading while on the move.
• Telebanking: Banking services accessible via mobile phones, offering
convenience for customers and banks.
• M-Shopping: Shopping and payment applications for purchases using
mobile devices.
• Micropayment-Based Applications: Transactions involving small
amounts, facilitating business for rural communities.

CST476 Mobile Computing 22


Examples….

• Interactive Games: Mobile gaming and contest applications for


entertainment.
• Interactive TV Shows: Viewer participation through email, SMS, and
voice in TV programs.
• Digital/Interactive TV: Interactive programs including
video-on-demand, community programs, and shopping.
• Experts on Call: Appointment scheduling applications for experts and
clients.
• GPS-Based Systems: Location tracking applications for vehicles,
individuals, and fleet management.

CST476 Mobile Computing 23


Examples….

• Remote Monitoring: Applications for monitoring children at home


and controlling home appliances.
• Entertainment: Applications offering horoscope, jokes, and other
entertainment content.
• Directory Services: Information on movies, theaters, restaurants, and
public services.
• Sports: Applications providing live sports updates, especially cricket
scores in India.
• Maps/Navigation Guide: Location-aware navigation applications for
optimal route planning.
• Virtual Office: Mobile applications for self-employed individuals to
manage emails, schedules, and appointments.
• M-Exchange for Industries: Cost-effective solutions for
manufacturing industry exchanges via mobile devices.

CST476 Mobile Computing 24


Examples….

• M-Exchange for Agricultural Produce: Platforms for farmers to


exchange information on agricultural products.
• Applications for Speech/Hearing Challenged People: Text-based
communication applications for individuals with disabilities.
• Agricultural Information: Mobile alerts for farmers regarding
weather conditions and farming decisions.
• Corporate Knowledge-Based Applications: Mobile access to
corporate knowledge bases for cost reduction and productivity
improvement.
• Community Knowledge-Based Applications: Mobile access to
community knowledge for societal benefit.

CST476 Mobile Computing 25


Examples….

• Distance Learning: Mobile applications for distance learning in


regions with limited access to digital technology.
• Digital Library: Accessible libraries through the internet for easy and
convenient access to information.
• Telemedicine and Healthcare: Mobile healthcare applications for
remote diagnosis and medical assistance.
• Micro-Credit Schemes: Mobile applications facilitating micro-credit
transactions for microeconomy development.
• Environmental Protection and Management: Mobile applications for
environmental monitoring and industrial hygiene. E-Governance:
Mobile applications bridging the digital divide for efficient
governance.
• Virtual Laboratories: Accessible laboratories and knowledge
repositories through digital technology.

CST476 Mobile Computing 26


Examples….

• Community Forums: Electronic platforms for social and community


meetings, enhancing community development.
• Law Enforcements: Mobile access to various law enforcement
services for efficient policing.
• Job Facilitator: Mobile alerts and information for job seekers and
employment opportunities.
• Telemetric Applications: Mobile applications for monitoring and
control across various industries and life spheres. Downloads:
Ringtones, pictures, and other downloadable content accessible via
mobile devices.
• Alerts and Notifications: Business and personal alerts including news
updates, critical health alerts, and sports score notifications.

CST476 Mobile Computing 27


INTERNET-THE UBIQUITOUS NETWORK
• A ubiquitous network refers to a communication infrastructure that is
widely available and accessible across various locations, allowing for
seamless connectivity and data transmission.
• It encompasses the integration of different networks, technologies, and
devices to create a unified and pervasive communication environment.
• For any content to be available anywhere, we need a ubiquitous network
that will carry this content.

CST476 Mobile Computing 28


There are two primary types of ubiquitous
networks:
• Telecommunication Network: This network encompasses various
technologies and infrastructure used for communication over long
distances. It includes traditional telephone networks, mobile networks
(such as 3G, 4G, and 5G), satellite communication systems, and other
wireless communication technologies.
• Internet Network: The Internet is a global network of interconnected
computers and devices that communicate using standardized protocols,
primarily TCP/IP (Transmission Control Protocol/Internet Protocol). It
provides access to a vast array of resources and services, including
websites, email, file sharing, online streaming, social media, and more

CST476 Mobile Computing 29


UBIQUITOUS NETWORK
• A ubiquitous network can be divided into three main segments, viz.,
Core, Edge and Access

Core

core is the backbone of the network,


is the innermost part of the network.
The primary function of the core network is to deliver traffic efficiently
at the least cost.
Focuses on traffic as bit streams.
Long-distance operators and backbone operators own core networks.
This part of the network deals with transmission media and transfer
points.

CST476 Mobile Computing 30


Edge/Distribution layer:
this is at the edge of the network.
These are generally managed and owned by ISPs (Internet Service
Providers) or local switches and exchanges.
Focuses on traffic from a service perspective.
It is also responsible for the distribution of traffic.
Access:
This part of the network services the end point or the device by which
the service will be accessed.
This deals with the last mile of transmission.
This part is either through a wireline or the wireless.
From the mobile computing point of view, this will be mostly through
the wireless.

CST476 Mobile Computing 31


Network Functionality:

• Core/Backbone Network: High-capacity communication facilities


connecting primary nodes, facilitating information exchange between
sub-networks.
• Edge Network: Manages information exchange between access and
core networks,.The devices and facilities in the edge networks are
switches, routers, routing switches, IADs and a variety of MAN/WAN
devices, which are often called edge devices
• Access Layer: Connects devices to the network, enabling user access
to network services and resources.

CST476 Mobile Computing 32


ARCHITECTURE FOR MOBILE COMPUTING
The network-centric mobile computing architecture contains 3 tiers
1. User Interface or Presentation Tier
2. Process Management or Application Tier
3. Database Management or Data Tier

CST476 Mobile Computing 33


CST476 Mobile Computing 34
Presentation Tier

• first layer is the User Interface or Presentation Tier.


• This layer deals with user facing device handling and rendering.
• This tier includes a user system interface where user services (such as
session, text input, dialog and display management} reside.

CST476 Mobile Computing 35


Application Tier
• The second tier is the Process Management or Application Tier.
• This layer is for application programs or process management where
business logic and rules are executed.
• This layer is capable of accommodating hundreds of users.
• In addition, the middle process management tier controls
transactions and asynchronous queuing to ensure reliable completion
of transactions.

CST476 Mobile Computing 36


Data Tier
• The third and final tier is the Database Management or Data Tier.
• This layer is for database access and management.
• The three-tier architecture is better suited for an effective networked
client/server design.
• It provides increased performance, flexibility, maintainability,
reusability, and scalability, while hiding the complexity of distributed
processing from the user.

CST476 Mobile Computing 37


THREE-TIER ARCHITECTURE

CST476 Mobile Computing 38


CST476 Mobile Computing 39
Presentation Tier(Tier 1)

This is the user facing system in the first tier.


This is the layer of agent applications and systems.
These applications run on the client device and offer all the user
interfaces.
This tier is responsible for presenting the information to the end user.
Humans generally use visual and audio means to receive information from
machines
Humans also use keyboard ,pen , touch screen or Voice to feed the data to
the system.
This tier is responsible fro presenting information to the end user
'Presentation Tier' includes web browsers (like Mozilla, Lynx, Internet
Explorer and Netscape Navigator), WAP browsers and customized client
programs.

CST476 Mobile Computing 40


Application Tier (Tier-2)

•The application tier or middle tier is the "engine" of a


ubiquitous application.
•It performs the business logic of processing user input,
obtaining data, and making decisions.
•In certain cases, this layer will do the transcoding of data
for appropriate rendering in the Presentation Tier.
•The Application Tier may include technology like
CGls,Java,JSP, .NET services, PHP or ColdFusion, deployed
in products like Apache, WebSphere, WebLogic, iPlanet,
Pramati, JBOSS or ZENO.
•The application tier is presentation and
database-independent,
CST476 Mobile Computing 41
•In a mobile computing environment, in addition to the business
logic there are quite a few additional management functions that
need to be performed.
•These functions relate to decisions on rendering, network
management, security, datastore access, etc. Most of these
functions are implemented using different middleware software.
•A middleware framework is defined as a layer of software, which
sits in the middle between the operating system and the user
facing software.
We can group middleware into the following major categories:
1. Message-oriented Middleware,
2. Transaction Processing Middleware.
3. Database Middleware,
4. Communication Middleware.
5. Distributed Object and Components.
6. Transcoding Middleware

CST476 Mobile Computing 42


Data Tier (Tier-3)

The Data Tier is used to store data needed by the application and acts
as a repository for both temporary and permanent data.
The data can be stored in any form of datastore or database. These
can range from sophisticated relational database, legacy hierarchical
database, to even simple text files.
Database Middleware
Database middleware allows the business logic to be independent and
transparent of the database technology and the database vendor.
Database middleware runs between the application program and the
database. These are sometimes called database connectors as well.
Examples of such middleware will be ODBC,JDBC, etc. Using these
middleware, the application will be able to access data. from any data
source.
Data sources can be text files, flat files, spreadsheets, or a network,
relational, indexed, hierarchical, XML database, object database, erc.,
from vendors like Oracle, SQL, Sybase, etc.

CST476 Mobile Computing 43


A middleware framework is defined as a layer of software, which sits in
the middle between the operating system and the user facing
software.
We can group middleware into the following major categories:
1. Message-oriented Middleware,
2. Transaction Processing Middleware.
3. Database Middleware,
4. Communication Middleware.
5. Distributed Object and Components.
6. Transcoding Middleware

CST476 Mobile Computing 44


Message-oriented Middleware (MOM)

Message-oriented Middleware e framework connecting applications through


asynchronous message exchange.
Functionality: Enables communication across different platforms without platform
dependencies.
Message Content: Contains formatted data, action requests, or unsolicited responses.
Message Queue: Provides queue between interoperating applications, holding messages
until processed.
Characteristics: Typically asynchronous, peer-to-peer, and operates in publish/subscribe
mode.
Publish/Subscribe: Objects subscribe to events, and MOM notifies subscribers when
events occur.
Support: Many MOM implementations also support synchronous message passing.
Applicability: Suitable for event-driven applications, delegating event notification to
middleware.
Integration Platform: Facilitates integration of applications in net-centric environments.
Examples: IBM's MQSeries and Java's JMS are common implementations of MOM.

CST476 Mobile Computing 45


Transaction Processing (TP) Middleware
• Transaction Processing (TP) Middleware is the set of Tools and
environment for developing transaction-based distributed applications.
• Functionality: Inputs data from information sources and outputs to
information sinks.
• Flexibility: Supports different input and output devices, including
unsolicited messages.
• Applications: Used in data management, network access, security
systems, order processing, reservations, customer service, etc.
• Scalability: Capable of serving thousands of clients in a distributed
client/server environment.
• Features: Includes management features like process restarting, load
balancing, and ensuring data consistency.
• Database Independence: Independent of database architecture for
optimization and resource multiplexing.

CST476 Mobile Computing 46


•Performance: Optimizes resource usage, reducing
response time through multiplexing client functions.
•Services: Provides services for order processing, forms
management, data management, network access,
authorization, and security.
•Implementation: In Java and net-centric systems, TP is
done through J2EE application servers with entity and
session beans.

CST476 Mobile Computing 47


CST476 Mobile Computing 48
Communication Middleware

Purpose: Connects applications via middleware (e.g., telnet).


Usage: Essential in telecommunications.
Telnet Interface: Common in core telecom networks.
Mediation Server: Automates telnet for node communication.
Legacy Integration: Links legacy apps via proprietary protocols like
TN5250 or TN3270.

CST476 Mobile Computing 49


Distributed Objects and Components:
CORBA
Example: CORBA (Common Object Request Broker Architecture).
Standardization: By the Object Management Group.
Simplifies: Common network programming tasks.
Tasks: Object registration, location, activation, request demultiplexing,
error-handling, parameter marshalling, unmarshalling, and operation
dispatching.
Vendor Independence: CORBA is a vendor-independent infrastructure.
Interoperability: Programs from different vendors, on various
platforms and networks, can interoperate seamlessly.

CST476 Mobile Computing 50


Transcoding Middleware

• Transcoding Middleware is used to transcode one format of data to


another to suit the need of the client. For example, if we want to
access a web site through a mobile phone supporting WAP, we need
to transcode the HTML page to WM L page so that the mobile phone
can access
• Technically transcoding is used for content adaptation to fit the
need of the device. Content adaptation is also required lo meet the
network bandwidth needs. For example, some frames in a video clip
need to be dropped for a low bandwidth network. Content
adaptation used to be done through proprietary protocols.
• To allow interoperability, IETF has accepted the Internet Content
Adaptation Protocol (ICAP). ICAP is now standardized and described
in RFC3507.

CST476 Mobile Computing 51


Internet Content Adaptation Protocol (ICAP)
• ICAP, the Internet Content Adaptation Protocol, is a protocol aimed at
providing simple object-based content vectoring for HTTP services
• ICAP is a lightweight protocol to do transcoding on HTTP messages. This
is similar to executing a "remote procedure call" on a HTTP request.
• The protocol allows ICAP clients to pass HTTP messages to ICAP
servers for some sort of transformation, The server executes its
transformation service on messages and sends back responses to the
client, usually with modified messages. The adapted messages may be
either HTTP requests or HTTP responses
• ICAP works at the edge part of the network as depicted in figure 1.6.

CST476 Mobile Computing 52


CST476 Mobile Computing 53
• Typical data flow in an ICAP environment is depicted in Figure 1.6 and
described here.
1. A user agent makes a request to an ICAP-capable surrogate {ICAP
client) for an object on
an origin server.
2. The surrogate sends the request to the ICAP server.
3. The ICAP server executes the ICAP resource's service on the request
and sends the possibly modified request, or a response to the request
back to the ICAP client.
4. The surrogate sends the request, possibly different from the original
client's request, to the origin server.
5. The origin server responds to the request.
6. The surrogate sends the reply (from either the ICAP or the origin server)
to the client.

CST476 Mobile Computing 54


Web Services

•Web services provide a standard means of communication


and information exchange among different software
applications, running on a variety of platforms or frameworks.
•service is a software system identified by a URI, whose public
interfaces and bindings are defined using XML (eXtensible
Markup Language).

•The basic architecture includes Web service technologies


capable of:
•Exchanging messages.
•Describing Web services.
•Publishing and discovering Web service descriptions.

CST476 Mobile Computing 55


Roles of Software Agents in the basic architecture are as follows:

Service Requester:
Function: Requests Web service execution.
Responsibilities: Initiates communication with service providers.
Service Provider:
Function: Processes requests for Web services.
Responsibilities: Executes requested services and provides necessary functionality
or data.
Discovery Agency (Broker):
• Function: Facilitates publication and discovery of Web service descriptions.
• Responsibilities: Acts as intermediary, ensuring service descriptions are
published and discoverable.

CST476 Mobile Computing 56


CST476 Mobile Computing 57
CST476 Mobile Computing 58
Client Context Manager

• Context serves as the basis for modifying content or application


behavior, requiring a Client Context Manager to gather and maintain
information about the client device, user, network, and surrounding
environment.
• This information is provided by Awareness Modules, which are
sensors capturing various data.
• These sensors can be hardware or software-based and may reside in
the device, network, or middleware. For instance, a hardware sensor
can determine the user's precise location, while a software sensor
identifies the type of user agent

CST476 Mobile Computing 59


• Almost any information available at the time of an interaction can be
seen as context information. Some examples are:
1. Identity: The device will be in a position to communicate its identity
without any ambiguity.
2. Spatial information: Information related to the surrounding space. This
relates to location, orientation, speed, elevation and acceleration.
3. Temporal information: Information related to time. This will be time
of the day, date, time zone and season of the year.
4.Activity: This relates to the activity state of the user. This includes
information like talking,reading, walking and running.
5.Availability of resources: 'This will relate to information about the device
in use. This will include battery power, processing power etc.

CST476 Mobile Computing 60


Three aspects of context management:

•l. Context sensing: The way in which context data


is obtained.
•2. Context representation: The way in which
context information is stored and transported.
•3. Context interpretation: The way in which
meaning is obtained from the context
representation

CST476 Mobile Computing 61


CST476 Mobile Computing 62
CST476 Mobile Computing 63
CST476 Mobile Computing 64
CST476 Mobile Computing 65
CST476 Mobile Computing 66
CST476 Mobile Computing 67
CST476 Mobile Computing 68
CST476 Mobile Computing 69
CST476 Mobile Computing 70
CST476 Mobile Computing 71
CST476 Mobile Computing 72
CST476 Mobile Computing 73
CST476 Mobile Computing 74
CST476 Mobile Computing 75
CST476 Mobile Computing 76
CST476 Mobile Computing 77
CST476 Mobile Computing 78
CST476 Mobile Computing 79
CST476 Mobile Computing 80
CST476 Mobile Computing 81
CST476 Mobile Computing 82
CST476 Mobile Computing 83
CST476 Mobile Computing 84
CST476 Mobile Computing 85
CST476 Mobile Computing 86
CST476 Mobile Computing 87
THANKS!!!!!

CST476 Mobile Computing 88

You might also like