Preview

Case Study: Mobile And Pervasive Computing

Powerful Essays
Open Document
Open Document
805 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Case Study: Mobile And Pervasive Computing
Solution of Assignment No. 01 by MS140400116

SEMESTER Fall 2015 CS710 – Mobile and pervasive Computing

Due Date: 19th November, 2015

Instructions to Solve Assignments

The purpose of assignments is to give you hands on practice. It is expected that students will solve the assignments themselves. Following rules will apply during the evaluation of assignment.

• Cheating from any source will result in zero marks in the assignment.
• Any student found cheating in any two of the assignments submitted will be awarded "F" grade in the course.
• In case of question No. 02 and 03, direct copy and paste from the research paper will be awarded
…show more content…
These issues may be as of:-
1. Smart spaces
2. Invisibility
3. Localized scalability
4. Uneven Conditioning
5. Power Management
6. User adaptation
7. Location aware/ Location sensitivity
8. Wireless discovery
9. Remote communication
10. Distributed communication
11. Mobile networking..etc.
Research problems in pervasive computing relate to those in distributed systems and mobile computing, where problems in distributed systems may be as
- Remote communication
- Fault tolerance and two-phase commit.
- High availability
- Remote information access
- Security

While problems in mobile computing may be as of:
- Mobile networking
- Mobile information access
- Support for adaptive applications
- System level energy saving techniques
- Location sensitivity

Thus, practical realization of pervasive computing requires solving difficult design and implementation problems. For proactively to be effective, it is crucial that a pervasive computing system track user intent so that if the connection disconnect while playing the video, problem of reconnect successfully should be solved to that particular user. The need to make mobile devices smaller, lighter and have longer battery life means that their computing capabilities have to be compromised. Cyber foraging construed as “living off the land” may be an effective way to deal with this problem.
…show more content…
There are three alternative strategies for adaptation in pervasive computing. First, a client can guide applications in changing their behavior so that they use less of a scarce resource. Second, a client can ask the environment to guarantee a certain level of a resource. Third, a client can suggest a corrective action to the user. The existence of smart spaces suggests that some of the environments encountered by a user may be capable of accepting resource reservations while uneven conditioning of environments suggests that a mobile client cannot rely solely on a reservation based

You May Also Find These Documents Helpful

  • Best Essays

    There are thousands of applications that have been developed for mobile devices which perform a myriad of tasks and processes. In the beginning most of these applications were games. Businesses later joined the mobile revolution and developed their own business based applications to run on these mobile devices. Many mobile business applications can now streamline business processes, reduce operational processing times and provide better customer service. The mobile revolution has forced many industries to reengineer their business processes…

    • 3576 Words
    • 15 Pages
    Best Essays
  • Better Essays

    Week 10 Term Paper

    • 3259 Words
    • 10 Pages

    In this term paper, I will assess the effectiveness and efficiency mobile-based applications provide to capture geolocation data and customer data, and quickly upload to processing server without users having to use a desktop system. Next, I will evaluate benefits realized by consumers because of the ability to gain access to their own data via mobile applications. Following the examination the challenges of developing applications that run on mobile devices because of the small screen size. Then I will describe the methods that can be used to decide which platform to support. Afterward I will discuss ways of providing high availability given that a mobile application requires high availability because of end users needing to have continuous access to IT and IS systems. Last but not least, I will discuss methods of making mobile devices more secure, since mobile devices are subjected to hacking at a higher rate than non-mobile devices.…

    • 3259 Words
    • 10 Pages
    Better Essays
  • Powerful Essays

    receiving an F grade for the course. A report will be filed with the Campus Disciplinarian. CHEATING WILL NOT BE…

    • 1375 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    As this is an individual assessment item, students should work on their own and present their individual assignment submission. If found to have cheated, all submissions involved would receive a mark of zero for this assessment item.…

    • 982 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Mobile computing and social networks are part of the daily lives of millions of Americans. “48% of American adults own a mobile computing device in some form according to the latest Nielsen data.” (Knott, 2012) As far as social networking site usage “over 65% of all internet users in the United States use social networking sites.” (Brenner, 2012) It is obvious that mobile computing and social networking on the web is not a passing fade. There are many uses and applications for mobile computing and social networks. In this paper a few of these aspects will be examined. First an assessment will be made as to the effectiveness and efficiency mobile-based applications provide to capture geolocation data and customer data, and quickly upload to a processing server without users having to use a desktop system. Second, an evaluation of the benefits realized by consumers because of the ability to gain access to their own data via mobile applications will be completed. Third, the challenges of developing applications that run on mobile devices because of the small screen size will be examined. Forth, the methods that can be used to decide which platform to support, i.e., iPhone, iPad, Windows Phone, or Android will be described. Fifth, due to mobile applications requiring high availability because end users need to have continuous access to IT and IS systems, a discussion of the ways of providing high availability will be undertaken. Finally, because mobile devices are subjected to hacking at a higher rate than non-mobile devices, methods of making mobile devices more secure will be examined.…

    • 3631 Words
    • 15 Pages
    Better Essays
  • Better Essays

    computer assignment

    • 955 Words
    • 4 Pages

    As this is an individual assessment item, students should work on their own and present their individual assignment submission. If found to have cheated, all submissions involved would receive a mark of zero for this assessment item.…

    • 955 Words
    • 4 Pages
    Better Essays
  • Best Essays

    Tiny, portable gadgets, such as pocket digital assistants (PDAs) and mobile phones have been in the recent years pushed on the mark. Mobile or ubiquitous computing and handy gadgets are changing the relations between computers and humans.there is an introduction of a new communication approach based on context. This approach enables people to interact with computers, objects and environments seamlessly. Mobile computing devices have enabled composite cooperation and communication patterns that were not dreamt of in the past years. They possess vital features in portability, ability to share information using communication networks; wireless, and synchronizing the information with other standardized gadgets. There have drastic changes in the technological landscape in the past years led by the emergence of mobile computing devices focusing on consumer preferences.…

    • 1381 Words
    • 6 Pages
    Best Essays
  • Best Essays

    Mobile Computing

    • 4396 Words
    • 18 Pages

    Imagine a world without the Internet, online shopping, gaming, social networking, or up to the second news updates. All of these things could not have happened without the advent of mobile computing and the technology that has expanded over time. Just think, thirty years ago, we did not have any of these things, but they were starting to take shape. This paper will show you how mobile computing got its start and some of the technologies that are involved in that area such as laptop computers and cellphone technologies. Then, will move into the current state of mobile computing and how those same technologies have improved over the years. Finally, some of the possible future trends involved in mobile computing and its technologies. Everything that we use today as far as mobile computing technologies could not have existed without the advancement of computers in general, but how did mobile computing get its start?…

    • 4396 Words
    • 18 Pages
    Best Essays
  • Good Essays

    Wi-Fi Is Not a Barrier

    • 964 Words
    • 4 Pages

    I will be writing this paper to support my title to the idea that computer hardware is no longer a major barrier for wireless information systems. If I were writing this paper 10 years ago it would be titled differently. With the advancements that have been made over the last decade we are given the technology to access almost any information that is available on the internet though a myriad of different devices.…

    • 964 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Accounting

    • 2551 Words
    • 11 Pages

    DUE DATE: ASSIGNMENT PLANNER: MONDAY 1 AUGUST, BY 5.00pm FINAL ASSIGNMENT: THURSDAY 8 SEPTEMBER, BY 5.00pm…

    • 2551 Words
    • 11 Pages
    Powerful Essays
  • Powerful Essays

    Basic Functions of Os

    • 1245 Words
    • 5 Pages

    5. Device / Resource Management – Managing devices and resources and allowing the users to share the resources…

    • 1245 Words
    • 5 Pages
    Powerful Essays
  • Best Essays

    Pervasive Computing

    • 4584 Words
    • 19 Pages

    Prashanth G.K [1] Assistant Professor, Sushil Kumar Singh[2] Project Student Sarmistha Panda[2] Project Student Department of MCA, Siddaganga Institute of Technology, Tumkur, India, prashanthgk@gmail.com Kumar.sushil.singh24@gmail.com sarm.prad@gmail.com Abstract Pervasive computing environments gracefully integrate networked computing devices – from tiny sensors to extremely dynamic and powerful devices – with people and their ambient environments. Service discovery is an essential element for pervasive computing to achieve “anytime, anywhere” computing without requiring users’ active attention to computing devices and network services. Privacy and security issues are to be considered in the future. It is growing rapidly in developing area such as Information and Communications Technology (ICT). The term refers to the increasing integration of ICT into people’s lives and environments, made possible by the growing availability of microprocessors with inbuilt communications facilities. It has many potential applications, in medical area and home care to environmental monitoring and intelligent transport systems. This paper makes an overview of pervasive computing and discusses the growing debate over privacy, safety and environmental implications. Keywords- Device, Connectivity, User Interface, Applications, Technological Issues, Safety and Security, Privacy. 1. Introduction The meaning of Pervasive is ―existing in all parts of a place or thing‖. Eight billion embedded microprocessors1 are produced each year. This number is expected to rise dramatically over the next decade, making electronic devices ever more pervasive. These devices will range from a few millimeters in size (small sensors) to several meters (displays and surfaces). They may be interconnected via wired and wireless technologies into broader, more capable, networks. Pervasive computing systems (PCS) and services may lead to a greater degree of user knowledge of, or…

    • 4584 Words
    • 19 Pages
    Best Essays
  • Powerful Essays

    NTT , the Japanese telecoms group, and the team of scientists that invented the Red Tacton system. "Tacton" because with this technology, communication starts by touching (Touch), leading to various actions (Act on). We then added the color red to convey the meaning of warmth in communication. Combining these phrases led to the name, "RedTacton". Human society is entering an era of ubiquitous computing, when networks are seamlessly interconnected and information is always accessible at our fingertips. The practical implementation of ubiquitous services requires three levels of connectivity: Wide Area Networks (WAN), typically via the Internet, to remotely connect all types of severs and terminals; Local Area Networks (LAN), typically via Ethernet or Wi-Fi connectivity among all the information and communication appliances in offices and homes; and Human Area…

    • 1809 Words
    • 8 Pages
    Powerful Essays
  • Better Essays

    Advances in mobile technology have enabled a wide range of applications to be developed that can be used by people on the move. Developers sometimes overlook the fact that users will want to interact with such devices while on the move. Small screen sizes, limited connectivity, high power consumption rates and limited input modalities are just some of the issues that arise when designing for small, portable devices. One of the biggest issues is the context in which they are used. As these devices are designed to enable users to use them while mobile, the impact that the use of these devices has on the mobility of the user is a critical factor to the success or failure of the application (brookes.ac.uk, 2013).…

    • 1226 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    remote system controller

    • 1880 Words
    • 8 Pages

    Since the advent of mobile phone, (the first experimental handheld in 1973 by Dr Martin Cooper and first hand-held to be…

    • 1880 Words
    • 8 Pages
    Powerful Essays