Exploiting Logical Mobility Techniques in Physically Mobile Environments
نویسندگان
چکیده
With the recent developments in wireless networks (802.11, Bluetooth) and the sales of mobile computers of any kind (such as laptop computers, Personal Digital Assistants (PDAs), mobile phones etc.) soaring, we are experiencing the availability of increasingly powerful and mobile computing environments, roaming between different types of network connectivity. We have also recently witnessed the acceptance of logical mobility techniques, or the ability to ship part of an application or even a complete process from one host to another. The increasing popularity of the Java programming language and environment has largely been correlated with the acceptance of logical mobility techniques, due to the inherent code mobility infrastructure that Java provides. To facilitate application developers programme for mobile devices, mobile middleware systems have been developed, which rise the programmer abstraction beyond the network os layer, and tackle issues of heterogeneity, communication primitives, concurrency, security etc. Whereas various mobile middleware systems have been developed the use of logical mobility has been very limited. The purpose of this work is to investigate the use of logical mobility in mobile computing environments, our hypothesis being that it can bring tangible benefits to both developers and users which cannot be supported by the current state of the art. While investigating why the use of logical mobility has not been widely adopted by the mobile industry, we have found the following problems: There is currently no design stage methodology which allows application developers to model the effects of logical mobility in their applications at the design stage. This limits the development of mobile applications powered by logical mobility to simply trial-and-error scenarios, inhibiting their popularity. Moreover, we have found that there exists no mobile middleware that offers flexible use of logical mobility primitives to application developers, whilst allowing devices to traverse dynamically different types of networks, handling heterogeneity, service advertisement and discovery, communication etc. As such, applications using logical mobility primitives have to constantly reinvent the wheel in order to implement the solutions. We believe that these deficiencies in this area of research are closely related, being aspects of the same issue, one affecting the design stage, and the other the implementation stage. This work intends to address these deficiencies, by researching a design-stage methodology, which allows developers to evaluate the use of logical mobility paradigms in their application, and developing a mobile middleware, which will be targeted by the aforementioned methodology and will offer the …
منابع مشابه
Adaptable Mobile Applications: Exploiting Logical Mobility in Mobile Computing
An increasing number of applications is being written for mobile hosts, such as laptop computers, mobile phones, PDAs etc. These applications are usually monolithic, featuring very limited interoperability and context-awareness and are usually difficult to deploy and update. Application engineers have to deal with a very dynamic set of environments that these applications are in contact with an...
متن کاملExploiting Logical Mobility in Mobile Computing Middleware
In the past few years, we have witnessed the growth in availability of mobile computing devices, such as mobile phones, personal digital assistants (PDAs), laptop computers and the like, combined with the advent of new wireless networking systems, such as 802.11b, Bluetooth, and GSM/GPRS. Users of such devices demand access to networked information and services at all times and locations, and, ...
متن کاملA Formal Petri Net Based Model for Antivirus Update Agent System
In this paper, a formal model for antivirus update agent system is presented based on mobile agent technology and predicate/transition Petri nets. The mobile agent system contains two mobile agents called DCA and UNA. It sends out agents to update antivirus on client computers in a network. Each agent takes on a specified responsibility. First, DCA roams through the network and check the last d...
متن کاملA Formal Petri Net Based Model for Antivirus Update Agent System
In this paper, a formal model for antivirus update agent system is presented based on mobile agent technology and predicate/transition Petri nets. The mobile agent system contains two mobile agents called DCA and UNA. It sends out agents to update antivirus on client computers in a network. Each agent takes on a specified responsibility. First, DCA roams through the network and check the last d...
متن کاملTree-Based Reliable Multicast in Combined Fixed/Mobile IP Networks
This paper proposes a solution to delivering multicast data reliably not only to/from fixed hosts but also to/from mobile hosts in combined fixed/mobile IP networks, particularly with regard to the per-source shortest path multicast routing protocol and remote subscription option in IETF mobile IP multicast standard. We propose exploiting tree-based error recovery, well-established concept for ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2001