Preview

Case Study: Mobile And Pervasive Computing

Powerful Essays
Open Document
Open Document
805 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Case Study: Mobile And Pervasive Computing
Solution of Assignment No. 01 by MS140400116

SEMESTER Fall 2015 CS710 – Mobile and pervasive Computing

Due Date: 19th November, 2015

Instructions to Solve Assignments

The purpose of assignments is to give you hands on practice. It is expected that students will solve the assignments themselves. Following rules will apply during the evaluation of assignment.

• Cheating from any source will result in zero marks in the assignment.
• Any student found cheating in any two of the assignments submitted will be awarded "F" grade in the course.
• In case of question No. 02 and 03, direct copy and paste from the research paper will be awarded
…show more content…
These issues may be as of:-
1. Smart spaces
2. Invisibility
3. Localized scalability
4. Uneven Conditioning
5. Power Management
6. User adaptation
7. Location aware/ Location sensitivity
8. Wireless discovery
9. Remote communication
10. Distributed communication
11. Mobile networking..etc.
Research problems in pervasive computing relate to those in distributed systems and mobile computing, where problems in distributed systems may be as
- Remote communication
- Fault tolerance and two-phase commit.
- High availability
- Remote information access
- Security

While problems in mobile computing may be as of:
- Mobile networking
- Mobile information access
- Support for adaptive applications
- System level energy saving techniques
- Location sensitivity

Thus, practical realization of pervasive computing requires solving difficult design and implementation problems. For proactively to be effective, it is crucial that a pervasive computing system track user intent so that if the connection disconnect while playing the video, problem of reconnect successfully should be solved to that particular user. The need to make mobile devices smaller, lighter and have longer battery life means that their computing capabilities have to be compromised. Cyber foraging construed as “living off the land” may be an effective way to deal with this problem.
…show more content…
There are three alternative strategies for adaptation in pervasive computing. First, a client can guide applications in changing their behavior so that they use less of a scarce resource. Second, a client can ask the environment to guarantee a certain level of a resource. Third, a client can suggest a corrective action to the user. The existence of smart spaces suggests that some of the environments encountered by a user may be capable of accepting resource reservations while uneven conditioning of environments suggests that a mobile client cannot rely solely on a reservation based

You May Also Find These Documents Helpful

  • Best Essays

    There are thousands of applications that have been developed for mobile devices which perform a myriad of tasks and processes. In the beginning most of these applications were games. Businesses later joined the mobile revolution and developed their own business based applications to run on these mobile devices. Many mobile business applications can now streamline business processes, reduce operational processing times and provide better customer service. The mobile revolution has forced many industries to reengineer their business processes…

    • 3576 Words
    • 15 Pages
    Best Essays
  • Better Essays

    Week 10 Term Paper

    • 3259 Words
    • 10 Pages

    In this term paper, I will assess the effectiveness and efficiency mobile-based applications provide to capture geolocation data and customer data, and quickly upload to processing server without users having to use a desktop system. Next, I will evaluate benefits realized by consumers because of the ability to gain access to their own data via mobile applications. Following the examination the challenges of developing applications that run on mobile devices because of the small screen size. Then I will describe the methods that can be used to decide which platform to support. Afterward I will discuss ways of providing high availability given that a mobile application requires high availability because of end users needing to have continuous access to IT and IS systems. Last but not least, I will discuss methods of making mobile devices more secure, since mobile devices are subjected to hacking at a higher rate than non-mobile devices.…

    • 3259 Words
    • 10 Pages
    Better Essays
  • Powerful Essays

    receiving an F grade for the course. A report will be filed with the Campus Disciplinarian. CHEATING WILL NOT BE…

    • 1375 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    As this is an individual assessment item, students should work on their own and present their individual assignment submission. If found to have cheated, all submissions involved would receive a mark of zero for this assessment item.…

    • 982 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Ever since the introduction of the first mobile computer device, there has been a growing need and want for more and more mobile computing devices. Once users got the first taste of harnessing the power of the mobile device that was all they needed. Today, you cannot walk down any public road or walk into a public building without seeing users talking and connecting to the internet via mobile devices.…

    • 3826 Words
    • 16 Pages
    Powerful Essays
  • Better Essays

    computer assignment

    • 955 Words
    • 4 Pages

    As this is an individual assessment item, students should work on their own and present their individual assignment submission. If found to have cheated, all submissions involved would receive a mark of zero for this assessment item.…

    • 955 Words
    • 4 Pages
    Better Essays
  • Powerful Essays

    Basic Functions of Os

    • 1245 Words
    • 5 Pages

    5. Device / Resource Management – Managing devices and resources and allowing the users to share the resources…

    • 1245 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    In addition, according Dehlinger traditional software engineering approaches may not directly apply in a mobile device context. In this position paper, we discuss how these three factors present four significant challenges to mobile application software engineering that are critical to enable the design and development of quality mobile application utilizing the capabilities provided by mobile device hardware and platforms.…

    • 1599 Words
    • 7 Pages
    Powerful Essays
  • Powerful Essays

    Accounting

    • 2551 Words
    • 11 Pages

    DUE DATE: ASSIGNMENT PLANNER: MONDAY 1 AUGUST, BY 5.00pm FINAL ASSIGNMENT: THURSDAY 8 SEPTEMBER, BY 5.00pm…

    • 2551 Words
    • 11 Pages
    Powerful Essays
  • Good Essays

    Wi-Fi Is Not a Barrier

    • 964 Words
    • 4 Pages

    I will be writing this paper to support my title to the idea that computer hardware is no longer a major barrier for wireless information systems. If I were writing this paper 10 years ago it would be titled differently. With the advancements that have been made over the last decade we are given the technology to access almost any information that is available on the internet though a myriad of different devices.…

    • 964 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Case Sutudy

    • 733 Words
    • 3 Pages

    Applications can considerably enrich the experience of mobile devices by their variety of functions. The fact that Apple currently owns the most appealing collections of applications is why Apple has an advantage in the mobile computing market over its…

    • 733 Words
    • 3 Pages
    Good Essays
  • Best Essays

    Pervasive Computing

    • 4584 Words
    • 19 Pages

    Prashanth G.K [1] Assistant Professor, Sushil Kumar Singh[2] Project Student Sarmistha Panda[2] Project Student Department of MCA, Siddaganga Institute of Technology, Tumkur, India, prashanthgk@gmail.com Kumar.sushil.singh24@gmail.com sarm.prad@gmail.com Abstract Pervasive computing environments gracefully integrate networked computing devices – from tiny sensors to extremely dynamic and powerful devices – with people and their ambient environments. Service discovery is an essential element for pervasive computing to achieve “anytime, anywhere” computing without requiring users’ active attention to computing devices and network services. Privacy and security issues are to be considered in the future. It is growing rapidly in developing area such as Information and Communications Technology (ICT). The term refers to the increasing integration of ICT into people’s lives and environments, made possible by the growing availability of microprocessors with inbuilt communications facilities. It has many potential applications, in medical area and home care to environmental monitoring and intelligent transport systems. This paper makes an overview of pervasive computing and discusses the growing debate over privacy, safety and environmental implications. Keywords- Device, Connectivity, User Interface, Applications, Technological Issues, Safety and Security, Privacy. 1. Introduction The meaning of Pervasive is ―existing in all parts of a place or thing‖. Eight billion embedded microprocessors1 are produced each year. This number is expected to rise dramatically over the next decade, making electronic devices ever more pervasive. These devices will range from a few millimeters in size (small sensors) to several meters (displays and surfaces). They may be interconnected via wired and wireless technologies into broader, more capable, networks. Pervasive computing systems (PCS) and services may lead to a greater degree of user knowledge of, or…

    • 4584 Words
    • 19 Pages
    Best Essays
  • Powerful Essays

    NTT , the Japanese telecoms group, and the team of scientists that invented the Red Tacton system. "Tacton" because with this technology, communication starts by touching (Touch), leading to various actions (Act on). We then added the color red to convey the meaning of warmth in communication. Combining these phrases led to the name, "RedTacton". Human society is entering an era of ubiquitous computing, when networks are seamlessly interconnected and information is always accessible at our fingertips. The practical implementation of ubiquitous services requires three levels of connectivity: Wide Area Networks (WAN), typically via the Internet, to remotely connect all types of severs and terminals; Local Area Networks (LAN), typically via Ethernet or Wi-Fi connectivity among all the information and communication appliances in offices and homes; and Human Area…

    • 1809 Words
    • 8 Pages
    Powerful Essays
  • Better Essays

    Advances in mobile technology have enabled a wide range of applications to be developed that can be used by people on the move. Developers sometimes overlook the fact that users will want to interact with such devices while on the move. Small screen sizes, limited connectivity, high power consumption rates and limited input modalities are just some of the issues that arise when designing for small, portable devices. One of the biggest issues is the context in which they are used. As these devices are designed to enable users to use them while mobile, the impact that the use of these devices has on the mobility of the user is a critical factor to the success or failure of the application (brookes.ac.uk, 2013).…

    • 1226 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    remote system controller

    • 1880 Words
    • 8 Pages

    Since the advent of mobile phone, (the first experimental handheld in 1973 by Dr Martin Cooper and first hand-held to be…

    • 1880 Words
    • 8 Pages
    Powerful Essays