Distributed Simulation of Wireless Environments Using Mobile Agents

Size: px
Start display at page:

Download "Distributed Simulation of Wireless Environments Using Mobile Agents"

Transcription

1 Distributed Simulation of Wireless Environments Using Mobile Agents E. Mena IIS department Univ. of Zaragoza Zaragoza, Spain S. Ilarri Ý IIS department Univ. of Zaragoza Zaragoza, Spain A. Illarramendi LSI department Univ. of the Basque Country San Sebastián, Spain Abstract Nowadays it is growing the interest on designing services/applications that can be performed efficiently in mobile computing environments. However, testing these new applications becomes sometimes a difficult task due to the distributed and dynamic nature of the underlying network infrastructure. In this paper we present a distributed simulator of cellular networks, based on mobile technology, that can be used to test wireless data services. This simulator allows developers to define mobile computing environments that include both real and simulated mobile devices and base stations. The main goal is to hide from data services the true nature (real or simulated) of mobile devices and base stations in the scenario. In this way, we avoid the development of a data service prototype that deals with a simulated environment that later must be adapted to work on a real wireless network. We show the suitability of the simulator by using it to test two concrete wireless data services. Keywords: Simulation of wireless systems, mobile s 1 Introduction We are witnessing a great explosion in the use of different kinds of mobile devices that can be connected to Internet. These devices are used not only to make voice connections from anywhere and at anytime (phones) or to work locally (laptops, palmtops, etc.) but also to transmit data. Thus, it is growing the interest in designing data services/applications that can be performed efficiently in mobile computing environments. This work was supported by the CICYT project TIC and the DGA project P084/2001. Ý Work supported by the grant B132/2002 of the Aragón Government and the European Social Fund. However, testing those new applications becomes a difficult task due to the distributed and dynamic nature of the underlying network infrastructure. Testing a service is sometimes as hard as developing it. Moreover, developing data services using a real wireless network implies a high cost in wireless communication and devices : we could need many users, with real wireless devices, following certain behavior that we want to test. Some services could even need to extend the functionality of current mobile objects and base stations (for instance, we could want base stations to store GPS 1 location data sent by mobile objects under their area). We present in this paper a wireless infrastructure simulator, based on mobile technology [6], that can be used to test wireless data services. This simulator deals with mobile computing environments that can include both real and simulated mobile objects and base stations (s). The main features of the simulator are: 1) it allows a distributed simulation, using different computers to simulate several s and mobile objects, 2) it manages scenarios with real and simulated entities at the same time, and 3) it uses mobile technology as software representations of their hardware counterparts (mobile objects). The most important goal of the simulator is to hide the true nature (real or simulated) of mobile objects and s in the scenario from the data service that we want to test. The idea is to avoid the development of a data service prototype that deals with a simulated environment, and later the development of the final data service that deals with a real wireless network. The goal of our simulator is to allow developers to test high-level data services and evaluate network protocols. Consequently, our work is orthogonal to those dealing with the simulation of wireless networks at protocol level. In fact we could use such works to improve our simulator at low level. In WINES [10, 11], a cellular network simulator is 1 The Global Positioning System (GPS) is a free-to-use global network of 24 satellites run by the US Department of Defense. Anyone with a GPS receiver can receive their satellite position and thereby find out where they are [5].

2 proposed, along with a traffic generator that allows to simulate the behavior of mobile users in the context of telephony activity. The Network Simulator (ns) is a commonly-used publicly available network research simulator; in [2] they describe the design and implementation of a facility that allows to link the simulated world with the real world. As far as the simulation of mobile objects concerns, for which the coordinates corresponding to their trajectories must be obtained, there are some other projects that also deal with the problem of generating location data for benchmarking spatio-temporal databases [9, 7, 1]. However these works focus on evaluating performance rather than on testing the functionality of high-level data services as we do. In the rest of the paper we describe in Section 2 the role of mobile objects and s in a wireless environment. In Section 3 and 4 we introduce the techniques used to simulate mobile objects and s, respectively. In Section 5 we show how to simulate a sample scenario. In Section 6 we evaluate the simulator by using it to test two wireless data services. Finally, conclusions and future work appear in Section 7. 2 Mobile Objects and Base Stations As framework of our work, we consider the generally accepted mobile environment architecture, where a mobile object (laptop, PDA, etc.) communicates with its Base Station (), which provides service to all the mobile objects within its coverage area [8]. Thus, in this section we briefly describe these two elements. 2.1 Mobile Objects Mobile objects are devices with a wireless connection. They are managed by users and range from advanced mobile phones to laptops with capabilities similar to desktop computers. For simplicity, we will also call mobile object to any (static or mobile) entity provided with a wireless device, for example, a car or a person with a wireless communication device. As mobile objects move, they can change from one coverage area to another (handoff). They can disconnect anytime (the device is powered off, it runs out of battery or it enters an area without coverage) and reconnect from a different location later. Some appliances can be attached to mobile objects, such as a mobile phone or a GPS receiver. Mobile objects can also execute different software, such as a word processor or a web browser. Thus, depending on their features, mobile objects provide users with different functionalities. 2.2 Base Stations (s) s provide connectivity to mobile objects under their area. The communication between a mobile object and the that provides it with coverage is wireless and the communication among s is wired. s maintain information about mobile users (user id, user profile, etc) under their areas. Strictly speaking, instead of s we should say Mobile Switching Stations (MSSs) which are the elements that control several s and have the capability to execute software that controls communications among wireless devices, providing them with access to the wired network. For simplicity, in the rest of the paper we use the term base station, which is more popular, for intermediate elements between mobile users and the rest of the network, and for the software application(s) residing on s that manages mobile object communications. 3 Simulated Mobile Objects In this section we introduce our proposal to simulate mobile objects. We define a simulated object as a conceptualization of a mobile object. Simulated objects can be inspired by real mobile objects, although could have different features: for example, we could want a real stationary object to appear in a certain scenario as a mobile object with a GPS receiver. A simulated object will be implemented as a mobile 2 that will behave as we want the simulated object behaves (this includes mobility and any other functionality). Basically, the simulation of a mobile object requires the execution of three tasks: 1. Simulation of the object s functionality. We should simulate the different functionalities of the simulated object (provided to real objects by hardware appliances or software applications) in which we are interested. Thus, each interesting behavior will be implemented as a thread in the mobile. For example, we can simulate a mobile user who is working with a web browser on his wireless device with a GPS receiver, as a mobile with two threads: one would be a GPS simulator that provides the location of the user s (wanted) trajectory, and another that would request web pages following the wanted user behavioral pattern (see Figure 1). 2. Simulation of the object s movements. The mobile begins its execution on the that provides coverage to the initial location of the simulated object 2 Agents are programs that execute in contexts denominated places [6]. Mobile s can travel from one place to another. We could use remote procedure calls instead of mobile s, but this would lead to a more inefficient and difficult to implement solution.

3 GPS simulator Place Web browser simulator Mobile Web browser Figure 1. Real and simulated objects communicating with a that such an represents 3. The mobile simulates that it follows a predefined path by processing a function that returns the next location from the current location, speed and direction ; however it could be something more complex, since the mobile can be programmed with any wanted behavior. The mobile should communicate with the on its current in such a way that it is registered as a real mobile object would be registered. In this way, from the point of view of a wireless data service, there would be no difference between a real and a simulated object. 3. Simulation of handoffs. The mobile is initialized with the corresponding catalog 4 (s in the scenario and their coverage areas, as explained in Section 4). When the mobile detects that the location of the simulated object that represents leaves the area of the current and enters the area of a different, then the mobile moves there (we said before that the mobile is always on the that provides coverage to the simulated object). We would like to point out that the previous will only notice that a mobile object under its area has stopped communicating, and the new will only notice that a new mobile object under its area is communicating. If a simulated object moves to a location without coverage, according to the network infrastructure, the corresponding mobile remains on the last until the simulated object enters the area of a. When this happens, the mobile moves there. Notice that the use of mobile s allows us to create from very simple simulated objects that follow a predefined path, to complex simulated objects that react to their environment by changing their behavior. Communication delays or temporal disconnections can also be easily simulated by the mobile. 3 We assume that each (real or simulated) has a place where mobile s can execute. 4 In a real situation, mobile objects discover dynamically the network infrastructure, by using signals received from nearby s. 4 Simulated Base Stations In this section we introduce our proposal to simulate base stations. We define a simulated base station as a certain conceptualization of a base station. Simulated s can be inspired by real base stations. For example, to test certain data services, we could want a real base station to have a different coverage area. A simulated will be implemented by creating a place in a fixed machine with a, which will provide the wanted functionality of a. These two elements, the place and the, can reside on any computer in the fixed network (real s are wired connected). The IP address of such a fixed computer will be stored in the Catalog to identify the simulated ; IP addresses of real s are also stored in the Catalog in order to allow simulated objects to be aware of the network infrastructure, as explained before. Figure 2. Catalog example In Figure 2 we show an example of catalog (simulated are those with dashed areas) where we store the id, URL (IP address and port in which requests from mobile objects can be received), location and coverage area 5 of each in a sample scenario. Notice that both real and simulated s are identified similarly by a URL. Different s can be simulated on different or the same fixed computer (as shown in Figure 3). Thus, when a simulated mobile object, or the tested data service, needs to communicate with a, 5 In our prototype, coverage areas are defined by dragging the mouse. However any other method could be used to be more precise.

4 3 2 Fixed computer supporting simulated 4 assistant Fixed computer assistant assistant Figure 4. A simulated detecting" a real mobile object Figure 3. Real scenario for the Catalog example it first obtains the URL of such a by consulting the catalog. So the data service is not aware about whether that is real or simulated. Simulated s that provide coverage to real objects We cannot simulate the complete functionality of a because, for example, a simulated cannot provide coverage to real mobile objects. However, we could define a scenario where a simulated (therefore non-existing) detects real mobile objects, only if those real objects are under the coverage of any real (included in our scenario or not). This scenario could be interesting due to three main reasons: 1) to simulate handoffs of mobile objects under the coverage of a single real, 2) to consider only a concrete region of the coverage area of a real, and 3) to test with real objects new functionalities not provided by real s (for example, s do not manage the coordinates of mobile objects under their area, which could be needed for a service that processes location-dependent queries). To detect real objects, the of the simulated sends Assistant s to the real s whose coverage area intersects the area of the simulated, as shown in Figure 4, where 4 is not real (indeed, it is simulated on certain fixed computer) and 3 is which actually provides coverage to the real mobile object. The goal of Assistants is sending to their information about mobile objects entering the area of its corresponding simulated. In Figure 4, Assistant on 3 sends the location of the real mobile object to the of the simulated 4. 5 Simulating a Sample Scenario In Figure 5 we show a sample scenario that we want to use for testing some wireless data service. The only real elements are: 1, 3, 4, car15, car38, policecar4, and policestation2; the rest of s and objects should be simulated (as shown in Figure 6, where simulated s are those with a dashed coverage area). However the real location of (real and simulated) mobile objects and s are presented in Figure 7. Notice that simulated s have been implemented as places (with a ) on two fixed computers, and simulated objects have been implemented as mobile s in the places of the s (real or simulated) that provide coverage to them in the wanted scenario. 4 5 policecar1 car38 policestation3 policecar15 6 policecar3 policeman2 3 policestation2 policeman1 2 Figure 5. Test scenario policecar5 policecar4 car15 1

5 6.1 Testing a Locker Rental Service Figure 6. Simulated entities for the test scenario This service offers users the possibility of keeping their data in a secure and safe space called locker (located on a ) [12]. In summary, the use of lockers provides wireless device users with the following advantages. Firstly, lockers alleviate the device exposure problem (wireless devices are more vulnerable and fragile than stationary devices, because they can be easily stolen, lost or damaged). Secondly, data stored in a locker are available for the s at the, even when the wireless device is disconnected, thus providing a solution for the availability problem (wireless devices might stay disconnected for long periods of time). So, specific tasks are carried out at the fixed network, with data stored in a locker, instead of on the user device, in this way relieving the media problem (wireless communications are often unstable, asymmetric and expensive). Thirdly, lockers can follow user movements, moving from to, but always residing close to the current location of the user, also relieving the media problem. Finally, due to the use of the technology in their implementation, lockers constitute an autonomous and auto-managed storage space. 3 policestation2 policecar1 policecar3 4 car38 policecar4 car15 2 Fixed computer 1 policestation3 policeman2 5 Fixed computer 2 policecar15 6 policeman1 policecar5 Figure 7. Real scenario for the test scenario 6 Evaluation In this section, we evaluate the suitability of the developed simulator by using it to simulate environments for two wireless data services of the ANTARCTICA system [3], concretely, a locker rental service [12] and a locationdependent query processor [4]. Although we present the simulator for these two sample applications, it can be easily used with other wireless data services. 1 Figure 8. Locker Rental Service: Differences due to the use of the simulator We have tested the locker rental service to see the influence of using the simulator (see Figure 8). Real data have been obtained in a scenario where a user residing on the US travels to Spain, concretely to San Sebastian and then to Zaragoza. When the user arrives to San Sebastian, his associated locker travels there too. Consequently, while the user is at San Sebastian, file requests imply access to the local. However, when the user arrives in Zaragoza, the system considers that it is better not to move the locker there (since there is not a big wired communication delay between Zaragoza and San Sebastian). Accessing times from Zaragoza to San Sebastian are similar to local accessing times, as wired communication costs are insignificant

6 with respect to the (much higher) wireless communication costs. We have simulated the previous scenario using three fixed computers to represent the s in the USA, San Sebastian and Zaragoza, respectively. The corresponding s simulate different delays among them (delays between those three geographical places using the fixed network). The user device was represented as a mobile traveling through the three s, which simulates the wireless network delay with them. In Figure 8, where x-axis shows the user requests at each location (ten accesses to files of about 190 KB) and y-axis shows the accumulated time of interaction between the user device and the locker (in seconds), we can see that times obtained are very similar whether we get them by simulation or not. Thus, by using the simulator, we obtain similar data to those obtained by running the data service on real s in different countries. 6.2 Testing a Location-dependent Query Processor We have developed a data service whose goal is the processing of location-dependent queries [4], i.e., queries for which the answer depends on location of objects. We deal with contexts where not only the user issuing the query can change her/his position, but the objects involved in the query can move as well. An example of location-dependent query is: show me the taxi cabs within two miles around my current position. Therefore we deal with continuous queries, i.e., queries whose answer must be updated continuously, as opposite to instantaneous queries in which only a single answer is obtained for a query. Unfortunately, we cannot test this service in a real environment because it needs that s manage the GPS coordinates of mobile objects under their area (current real s do not do that!). Thus, the only possibility is to define a simulated scenario (shown in Figure 5). In Figure 9 we show the precision of our locationdependent query processor (Figure 9) when simulating the wanted scenario in different ways: 1) all the elements (s and objects) are simulated on the same fixed computer, 2) one fixed computer for each (6 fixed computers), and 3) an alternative to our approach, without mobile s, using one fixed computer for each element, i.e., 6 fixed computer for s and 11 fixed computers more for mobile objects (represented as processes communicating with s using remote calls), trying to replicate a real scenario where each element is an independent device. In these three simulations, each mobile object communicates GPS location data to its with a wireless-like delay, and each stores GPS location data of mobile objects under its coverage. Figure 9. Location-dependent query processor In Figure 10 we focused on a certain mobile object, whose location was monitorized by the query processor. Notice that the precision of the query processor in the three simulations is very similar considering the inherent imprecision of such a service 6. From the point of view of the user, those differences are not significant as the answer is updated by the service every 5 seconds. Figure 10. Precision of query processor for different simulation strategies Therefore we obtain similar results when using our approach (avoiding using many hardware resources) with respect to using an approach closer to the reality (no mobile s but more hardware cost). 6 For example, notice the imprecision incurred around time=25 seconds, due to a handoff of the monitorized mobile object.

7 7 Conclusions and Future Work We have presented in this paper a wireless infrastructure simulator, based on mobile technology, that can be used to test wireless data services. This simulator deals with mobile computing environments that can include both real and simulated mobile objects and s. Mobile objects are simulated as mobile s that behave as real mobile objects, and s are simulated as places with a similar structure as real s. We summarize the three main contributions of our work: The proposed simulator is able to hide the true nature (real or simulated) of the mobile objects and s in the wireless network from the data service. So, this simulator allows developers to test a real data service in (completely or partially) simulated wireless environments. Therefore, the development of prototypes that deals only with simulated environments or only with real environments is avoided. The use of mobile s allows us to create from very simple simulated objects that follows a predefined path to complex simulated objects that react to their environment by changing their behavior. Simulations can be performed distributely, i.e., several base stations and objects can be simulated using different machines. Data services will not be aware of the distributed or local nature of these elements. We have also presented some performance results when using the simulator with two different data services. As future work, we plan to solve the problem of simulating a real mobile device that executes an -based application, i.e., a mobile device that contains a system composed of several mobile s. Another open issue is the development of a framework to define simulated scenarios using libraries of predefined s and mobile objects. [3] A. Goñi, A. Illarramendi, E. Mena, Y. Villate, and J. Rodriguez. Antarctica: A multi system for internet data services in a wireless computing framework. In NSF Workshop on an Infrastructure for Mobile and Wireless Systems, Scottsdale, Arizona (USA), October [4] S. Ilarri, E. Mena, and A. Illarramendi. A system based on mobile s for tracking objects in a location-dependent query processing environment. In Twelfth International Workshop on Database and Expert Systems Applications (DEXA 2001), Fourth International Workshop Mobility in Databases and Distributed Systems (MDSS 2001), Munich (Germany), pages IEEE Computer Society, ISBN , September [5] A. C. Inc. GPS World s Big Book of GPS Advanstar Communications Inc., [6] D. Milojicic, M. Breugst, I. Busse, J. Campbell, S. Covaci, B. Friedman, K. Kosaka, D. Lange, K. Ono, M. Oshima, C. Tham, S. Virdhagriswaran, and J. White. MASIF, the OMG mobile system interoperability facility. In Proceedings of Mobile Agents 98, September [7] D. Pfoser and Y. Theodoridis. Generating semantics-based trajectories of moving objects. In International Workshop on Emerging Technologies for Geo-Based Applications, Ascona, Switzerland, [8] E. Pitoura and G. Samaras. Data Management for Mobile Computing. Kluwer Academic Publishers, [9] J.-M. Saglio and J. Moreira. Oporto: A realistic scenario generator for moving objects. In DEXA Workshop, pages , [10] D. Samfat, V. Devernay, and C. Bonnet. A gsm simulation platform for intrusion detection. In Proc. IEEE ICC 95. Seattle, WA, pages , June [11] D. Samfat and R. Molva. Idamn: An intrusion detection architecture for mobile networks. IEEE Journal of Selected Areas in Communications, 15(7): , October [12] Y. Villate, A. Illarramendi, and E. Pitoura. Keep your data safe and available while roaming. Accepted for publication on MONET, Special Issue on Pervasive Computing, Acknowledgements We would like to thank Yolanda Villate for testing the Locker Rental Service using our simulator. References [1] T. Brinkhoff. A framework for generating network-based moving objects. Technical report, Technical Report of the Institute of Applied Photogrammetry and Geoinformatics Fachhochschule Oldenburg/Ostfriesland/Wilhelmshaven, May [2] K. Fall. Network emulation in the vint/ns simulator. In Proceedings of the 4th IEEE Symposium on Computers and Communications, July 1999.

Extending the Data Services of Mobile Computers by External Data Lockers

Extending the Data Services of Mobile Computers by External Data Lockers Extending the Data Services of Mobile Computers by External Data Lockers Yolanda Villate Ý Basque Country University, CS Dept. jibvipey@si.ehu.es Evaggelia Pitoura University of Ioannina, CS Dept. pitoura@cs.uoi.gr

More information

Generating Traffic Data

Generating Traffic Data Generating Traffic Data Thomas Brinkhoff Institute for Applied Photogrammetry and Geoinformatics FH Oldenburg/Ostfriesland/Wilhelmshaven (University of Applied Sciences) Ofener Str. 16/19, D-26121 Oldenburg,

More information

View Generator (VG): A Mobile Agent Based System for the Creation and Maintenance of Web Views*

View Generator (VG): A Mobile Agent Based System for the Creation and Maintenance of Web Views* View Generator (VG): A Mobile Agent Based System for the Creation and Maintenance of Web Views* George Samaras Dept. of Computer Science Univ. of Cyprus CY-1678 Nicosia, Cyprus cssamara@ucy.ac.cy Constantinos

More information

Mobile Computing Introduction

Mobile Computing Introduction Mobile Computing Introduction UNIT - 1 Prepared By:- NITIN PANDYA Assistant Professor, SVBIT. What is Mobile Computing 2 NTIIN PANDYA 3 NTIIN PANDYA Definitions Mobile Computing What is mobile computing?

More information

ADUS: Indirect Generation of User Interfaces on Wireless Devices Λ

ADUS: Indirect Generation of User Interfaces on Wireless Devices Λ ADUS: Indirect Generation of User Interfaces on Wireless Devices Λ N. Mitrović Email: mitrovic@prometeo.cps.unizar.es J. A. Royo y Email: joalroyo@unizar.es E. Mena Email: emena@unizar.es Abstract Nowadays,

More information

Chapter 3 A New Framework for Multicast Mobility in WiFi Networks

Chapter 3 A New Framework for Multicast Mobility in WiFi Networks Chapter 3 A New Framework for Multicast Mobility in WiFi Networks 3.1 Introduction This chapter presents the designed framework that was produced during this research. The chapter describes about network

More information

Generating Network-Based Moving Objects: Conception & Implementation Issues

Generating Network-Based Moving Objects: Conception & Implementation Issues Free University Bolzano 2006 Generating Network-Based Moving Objects: Conception & Implementation Issues Thomas Brinkhoff FH Oldenburg/Ostfriesland/Wilhelmshaven (University of Applied Sciences) Institute

More information

GSN. Fixed Network GSN GSN BS BS BS

GSN. Fixed Network GSN GSN BS BS BS Data Lockers: Mobile-Agent Based Middleware for the Security and Availability of Roaming Users Data Λ Yolanda Villate y Languages and Systems Department University of the Basque Country, Spain jibvipey@si.ehu.es

More information

IP Mobility vs. Session Mobility

IP Mobility vs. Session Mobility IP Mobility vs. Session Mobility Securing wireless communication is a formidable task, something that many companies are rapidly learning the hard way. IP level solutions become extremely cumbersome when

More information

Wireless Security Background

Wireless Security Background Wireless Security Background Wireless Networks The need for mobile computing Laptops, PDAs, Bluetooth devices Smart phones Enabling technology Wireless communication Two important characteristics Wireless

More information

Geospatial Information Service Based on Ad Hoc Network

Geospatial Information Service Based on Ad Hoc Network I. J. Communications, Network and System Sciences, 2009, 2, 91-168 Published Online May 2009 in SciRes (http://www.scirp.org/journal/ijcns/). Geospatial Information Service Based on Ad Hoc Network Fuling

More information

Congestion Control in Mobile Ad-Hoc Networks

Congestion Control in Mobile Ad-Hoc Networks Congestion Control in Mobile Ad-Hoc Networks 1 Sandeep Rana, 2 Varun Pundir, 3 Ram Sewak Singh, 4 Deepak Yadav 1, 2, 3, 4 Shanti Institute of Technology, Meerut Email: sandeepmietcs@gmail.com Email: varunpundir@hotmail.com

More information

Wireless (Select Models Only) User Guide

Wireless (Select Models Only) User Guide Wireless (Select Models Only) User Guide Copyright 2008 Hewlett-Packard Development Company, L.P. Windows is a U.S. registered trademark of Microsoft Corporation. Bluetooth is a trademark owned by its

More information

LOCATION DATA. Location information from mobile devices is typically obtained using the following:

LOCATION DATA. Location information from mobile devices is typically obtained using the following: LOCATION DATA Location information from mobile devices is typically obtained using the following: 1. Cell PING (Triangulation) 2. Stingray device 3. Wi-Fi, Bluetooth tracking 4. Apps and Web browsing 5.

More information

Definitions of USN, M2M, IoT, UN, and UC by International Standards and Papers

Definitions of USN, M2M, IoT, UN, and UC by International Standards and Papers Definitions of USN, M2M, IoT, UN, and UC by International Standards and Papers Younghwan CHOI, Hyoung Jun KIM (yhc@etri.re.kr, khj@etri.re.kr) 2010. 11. Table of Contents Ubiquitous Sensor Network (USN)

More information

Evaluating the Performance of Mobile Agent-Based Message Communication among Mobile Hosts in Large Ad Hoc Wireless Network

Evaluating the Performance of Mobile Agent-Based Message Communication among Mobile Hosts in Large Ad Hoc Wireless Network Evaluating the Performance of Mobile Agent-Based Communication among Mobile Hosts in Large Ad Hoc Wireless Network S. Bandyopadhyay Krishna Paul PricewaterhouseCoopers Limited Techna Digital Systems Sector

More information

Appeal Decision. Appeal No USA ALCATEL-LUCENT USA LTD. Tokyo, Japan. Tokyo, Japan

Appeal Decision. Appeal No USA ALCATEL-LUCENT USA LTD. Tokyo, Japan. Tokyo, Japan Appeal Decision Appeal No. 2014-5131 USA Appellant ALCATEL-LUCENT USA LTD. Tokyo, Japan Patent Attorney OKABE, Yuzuru Tokyo, Japan Patent Attorney YOSHIZAWA, Hiroshi The case of appeal against the examiner's

More information

On the Utilization of GSM Cell Id for Mobile Device Tracking and Notification

On the Utilization of GSM Cell Id for Mobile Device Tracking and Notification On the Utilization of GSM Cell Id for Mobile Device Tracking and Notification Yazan A. Alqudah 1, Sufyan Almajali 2 1 Department of Communications Engineering, 2 Department of Software Engineering Princess

More information

Wireless (Select Models Only) User Guide

Wireless (Select Models Only) User Guide Wireless (Select Models Only) User Guide Copyright 2008 Hewlett-Packard Development Company, L.P. Windows is a U.S. registered trademark of Microsoft Corporation. Bluetooth is a trademark owned by its

More information

Mobile Applications 2010

Mobile Applications 2010 Mobile Applications 2010 The Mobile Infrastructure Mobile Infrastructure Infrastructure (Merriam-Webster) the underlying foundation or basic framework (as of a system or organization) the system of public

More information

Dominique Carrega, Emmanuel Fournier, Hervé Muyal (Tecsi).

Dominique Carrega, Emmanuel Fournier, Hervé Muyal (Tecsi). Project Number: Project Title: Deliverable Type: (K/N)* AC343 MOVE K CEC Deliverable Number: AC343 / TEC / WP1 / DS / K / 1 / Contractual Date of Delivery to the CEC: July 1998 Actual Date of Delivery

More information

Software Downloading Solutions for Mobile Value-Added Service Provision

Software Downloading Solutions for Mobile Value-Added Service Provision Software Downloading Solutions for Mobile Value-Added Service Provision Ouahiba Fouial 1, Nikos Houssos 2, Nadia Boukhatem 1 1 Ecole Nationale Supérieure des Télécommunications, Département Informatique

More information

Multimedia Environment for Mobiles (MEMO) - Interactive Multimedia Services to Portable and Mobile Terminals

Multimedia Environment for Mobiles (MEMO) - Interactive Multimedia Services to Portable and Mobile Terminals Multimedia Environment for Mobiles (MEMO) - Interactive Multimedia Services to Portable and Mobile Terminals Thomas Lauterbach* and Matthias Unbehaun Robert Bosch Multimedia-Systems GmbH & Co. KG, P.O.

More information

Study on Indoor and Outdoor environment for Mobile Ad Hoc Network: Random Way point Mobility Model and Manhattan Mobility Model

Study on Indoor and Outdoor environment for Mobile Ad Hoc Network: Random Way point Mobility Model and Manhattan Mobility Model Study on and Outdoor for Mobile Ad Hoc Network: Random Way point Mobility Model and Manhattan Mobility Model Ibrahim khider,prof.wangfurong.prof.yinweihua,sacko Ibrahim khider, Communication Software and

More information

Hermes - A Framework for Location-Based Data Management *

Hermes - A Framework for Location-Based Data Management * Hermes - A Framework for Location-Based Data Management * Nikos Pelekis, Yannis Theodoridis, Spyros Vosinakis, and Themis Panayiotopoulos Dept of Informatics, University of Piraeus, Greece {npelekis, ytheod,

More information

Chapter 1. Storage Concepts. CommVault Concepts & Design Strategies: https://www.createspace.com/

Chapter 1. Storage Concepts. CommVault Concepts & Design Strategies: https://www.createspace.com/ Chapter 1 Storage Concepts 4 - Storage Concepts In order to understand CommVault concepts regarding storage management we need to understand how and why we protect data, traditional backup methods, and

More information

INTRODUCTION TO THE INTERNET. Presented by the Benbrook Public Library

INTRODUCTION TO THE INTERNET. Presented by the Benbrook Public Library INTRODUCTION TO THE INTERNET Presented by the Benbrook Public Library INTRODUCTION TO THE INTERNET What is the Internet? How did it come about? What is the World Wide Web? How does it work? How do I get

More information

GPS Mobile Phone Tracking. Software Beyond Imagination

GPS Mobile Phone Tracking. Software Beyond Imagination GPS Mobile Phone Tracking Software Beyond Imagination Thank you for your interest in our world first release of GPS Mobile Phone Tracking. The tracking software is very easy to install and use and is without

More information

Roberto Brignolo The SAFESPOT Integrated Project: Overview of the architecture, technologies and applications

Roberto Brignolo The SAFESPOT Integrated Project: Overview of the architecture, technologies and applications Roberto Brignolo The SAFESPOT Integrated Project: Overview of the architecture, technologies and applications General figures 2 Project type: Integrated Project (IP) Co-funded by: the European Commission

More information

From Mobility Management to Connectivity Management

From Mobility Management to Connectivity Management From Mobility Management to Management Jun-Zhao Sun and Jaakko Sauvola MediaTeam, Machine Vision and Media Processing Unit, Infotech Oulu P.O.Box 4500, FIN-90014 University of Oulu, Finland {Junzhao.sun,

More information

Concepts, Technology, and Applications of Mobile Commerce

Concepts, Technology, and Applications of Mobile Commerce Concepts, Technology, and Applications of Mobile Commerce Robert Nickerson Professor and Chair Department of Information Systems Director, Center for Electronic Business College of Business San Francisco

More information

Spontaneous Interaction using Mobile Phones and Short Text Messages

Spontaneous Interaction using Mobile Phones and Short Text Messages Spontaneous Interaction using Mobile Phones and Short Text Messages Frank Siegemund Distributed Systems Group, Department of Computer Science, Swiss Federal Institute of Technology (ETH) Zurich, 8092 Zurich,

More information

Wireless (Select Models Only) User Guide

Wireless (Select Models Only) User Guide Wireless (Select Models Only) User Guide Copyright 2007 Hewlett-Packard Development Company, L.P. Windows is a U.S. registered trademark of Microsoft Corporation. Bluetooth is a trademark owned by its

More information

The Role of Mobile Satellite Telecommunications in Disaster Communications

The Role of Mobile Satellite Telecommunications in Disaster Communications The Role of Mobile Satellite Telecommunications in Disaster Communications Gleb Larionov gleb.larionov@thuraya.com THURAYA Proprietary Information 1 Role of Thuraya Thuraya is a trendsetter in the area

More information

Searching for Similar Trajectories on Road Networks using Spatio-Temporal Similarity

Searching for Similar Trajectories on Road Networks using Spatio-Temporal Similarity Searching for Similar Trajectories on Road Networks using Spatio-Temporal Similarity Jung-Rae Hwang 1, Hye-Young Kang 2, and Ki-Joune Li 2 1 Department of Geographic Information Systems, Pusan National

More information

4G Mobile Communications

4G Mobile Communications 4G Mobile Communications Welcome to 4G The term 4G is used broadly to include several types of broadband wireless access communication systems, not only cellular telephone systems. One of the terms to

More information

Fog Computing. ICTN6875: Emerging Technology. Billy Short 7/20/2016

Fog Computing. ICTN6875: Emerging Technology. Billy Short 7/20/2016 Fog Computing ICTN6875: Emerging Technology Billy Short 7/20/2016 Abstract During my studies here at East Carolina University, I have studied and read about many different t types of emerging technologies.

More information

Telecom Italia response. to the BEREC public consultation on

Telecom Italia response. to the BEREC public consultation on Telecom Italia response to the BEREC public consultation on Guidelines on Net Neutrality and Transparency: Best practise and recommended approaches - BOR (11) 44 (2 November 2011) Telecom Italia response

More information

They avoid the cost, installation, and maintenance of network infrastructure.

They avoid the cost, installation, and maintenance of network infrastructure. Ad Hoc Network Ammar Abu-Hudrouss Islamic University Gaza ١ Introduction An ad hoc wireless network is a collection of wireless mobile nodes that self-configure to form a network without the aid of any

More information

Web Security Vulnerabilities: Challenges and Solutions

Web Security Vulnerabilities: Challenges and Solutions Web Security Vulnerabilities: Challenges and Solutions A Tutorial Proposal for ACM SAC 2018 by Dr. Hossain Shahriar Department of Information Technology Kennesaw State University Kennesaw, GA 30144, USA

More information

(Non-legislative acts) REGULATIONS

(Non-legislative acts) REGULATIONS 15.12.2012 Official Journal of the European Union L 347/1 II (Non-legislative acts) REGULATIONS COMMISSION IMPLEMENTING REGULATION (EU) No 1203/2012 of 14 December 2012 on the separate sale of regulated

More information

Compasses, Faces, and Butterflies: Route Discovery in Ad-Hoc Networks

Compasses, Faces, and Butterflies: Route Discovery in Ad-Hoc Networks Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 1 Compasses, Faces, and Butterflies: Route Discovery in Ad-Hoc Networks By Evangelos Kranakis School of Computer Science Carleton

More information

A New Hashing and Caching Approach for Reducing Call Delivery Cost and Location Server s Load in Wireless Mobile Networks

A New Hashing and Caching Approach for Reducing Call Delivery Cost and Location Server s Load in Wireless Mobile Networks Proceedings of 2009 12 th International Conference on Computer and Information Technology (ICCIT 2009) 21-23 December, 2009, Dhaka, Bangladesh A New Hashing and Caching Approach for Reducing Call Delivery

More information

Spatial and Temporal Aware, Trajectory Mobility Profile Based Location Management for Mobile Computing

Spatial and Temporal Aware, Trajectory Mobility Profile Based Location Management for Mobile Computing Spatial and Temporal Aware, Trajectory Mobility Profile Based Location Management for Mobile Computing Jianting Zhang Le Gruenwald The University of Oklahoma, School of Computer Science, Norman, OK, 73019

More information

A Resource Discovery Algorithm in Mobile Grid Computing Based on IP-Paging Scheme

A Resource Discovery Algorithm in Mobile Grid Computing Based on IP-Paging Scheme A Resource Discovery Algorithm in Mobile Grid Computing Based on IP-Paging Scheme Yue Zhang 1 and Yunxia Pei 2 1 Department of Math and Computer Science Center of Network, Henan Police College, Zhengzhou,

More information

Roaming with UltraWAPs

Roaming with UltraWAPs Roaming with UltraWs Rob Clark www.freenet-antennas.com July-2006 Summary It is often desired to design a wireless network that supports seamless roaming of mobile computers between Access Point () base

More information

The Internet and the World Wide Web

The Internet and the World Wide Web Technology Briefing The Internet and the World Wide Web TB5-1 Learning Objectives TB5-2 Learning Objectives TB5-3 How Did the Internet Get Started? Internet derived from internetworking 1960s U.S. Defense

More information

Introduction. Chapter 1: Mobile Communications SS A case for mobility History of mobile communication Market Areas of research

Introduction. Chapter 1: Mobile Communications SS A case for mobility History of mobile communication Market Areas of research Mobile Communications SS 2002 Chapter 1: Introduction A case for mobility History of mobile communication Market Areas of research Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/ MC SS02

More information

Designing a GPS Receiver Network with GNSS Algorithm for Accuracy and Safety

Designing a GPS Receiver Network with GNSS Algorithm for Accuracy and Safety International Global Navigation Satellite Systems Society IGNSS Symposium 2007 The University of New South Wales, Sydney, Australia 4 6 December, 2007 Designing a GPS Receiver Network with GNSS Algorithm

More information

Efficient Handoff using Mobile IP and Simplified Cellular IP

Efficient Handoff using Mobile IP and Simplified Cellular IP Presented at GNSS 2004 The 2004 International Symposium on GNSS/GPS Sydney, Australia 6 8 December 2004 Efficient Handoff using Mobile IP and Simplified Cellular IP S. Omar School of Surveying & Spatial

More information

User Interface Techniques for Mobile Agents

User Interface Techniques for Mobile Agents User Interface Techniques for Mobile Agents Matthias Grimm Mohammad-Reza Tazari Matthias Finke Computer Graphics Center (ZGDV) e.v. Fraunhoferstr. 5, 64283 Darmstadt, Germany {Matthias.Grimm, Saied.Tazari,

More information

Ad hoc networking using Wi-Fi during natural disasters: overview and improvements.

Ad hoc networking using Wi-Fi during natural disasters: overview and improvements. Ad hoc networking using Wi-Fi during natural disasters: overview and improvements. Matthijs Gielen University of Twente P.O.Box 217, 7500AE Enschede The Netherlands m.w.gielen@student.utwente.nl ABSTRACT

More information

IJRIM Volume 1, Issue 4 (August, 2011) (ISSN ) A SURVEY ON BEHAVIOUR OF BLACKHOLE IN MANETS ABSTRACT

IJRIM Volume 1, Issue 4 (August, 2011) (ISSN ) A SURVEY ON BEHAVIOUR OF BLACKHOLE IN MANETS ABSTRACT A SURVEY ON BEHAVIOUR OF BLACKHOLE IN MANETS Pinki Tanwar * Shweta** ABSTRACT A mobile adhoc network is a collection of mobile nodes which form a network which is not fixed. The nodes in the network dynamically

More information

Requirements for the Operations & Management of 4G Networks

Requirements for the Operations & Management of 4G Networks Requirements for the Operations & Management of 4G Networks Prof. James Won-Ki Hong Dept. of Computer Science and Engineering, Korea & Prof. Alberto Leon-Garcia Dept. of Electrical and Computer Engineering

More information

Optimized Paging Cache Mappings for efficient location management Hyun Jun Lee, Myoung Chul Jung, and Jai Yong Lee

Optimized Paging Cache Mappings for efficient location management Hyun Jun Lee, Myoung Chul Jung, and Jai Yong Lee Optimized Paging Cache Mappings for efficient location management Hyun Jun Lee, Myoung Chul Jung, and Jai Yong Lee Abstract Cellular IP maintains distributed cache for location management and routing purposes.

More information

Introduction to Mobile Ubiquitous Computing Systems

Introduction to Mobile Ubiquitous Computing Systems CPET 565 Mobile Computing Systems CPET/ITC 499 Mobile Computing Lecture 1 Introduction to Mobile Ubiquitous Computing Systems Paul I-Hai Lin, Professor Spring 2016 A Specialty Course Purdue University

More information

BUSNet: Model and Usage of Regular Traffic Patterns in Mobile Ad Hoc Networks for Inter-Vehicular Communications

BUSNet: Model and Usage of Regular Traffic Patterns in Mobile Ad Hoc Networks for Inter-Vehicular Communications BUSNet: Model and Usage of Regular Traffic Patterns in Mobile Ad Hoc Networks for Inter-Vehicular Communications Kai-Juan Wong, Bu-Sung Lee, Boon-Chong Seet, Genping Liu, Lijuan Zhu School of Computer

More information

SIPCache: A Distributed SIP Location Service for Mobile Ad-Hoc Networks

SIPCache: A Distributed SIP Location Service for Mobile Ad-Hoc Networks SIPCache: A Distributed SIP Location Service for Mobile Ad-Hoc Networks Simone Leggio Hugo Miranda Kimmo Raatikainen Luís Rodrigues University of Helsinki University of Lisbon August 16, 2006 Abstract

More information

A FLEXIBLE TRAFFIC GENERATOR FOR TESTING PABX AND CALL CENTER PERFORMANCE

A FLEXIBLE TRAFFIC GENERATOR FOR TESTING PABX AND CALL CENTER PERFORMANCE A FLEXIBLE TRAFFIC GENERATOR FOR TESTING PABX AND CALL CENTER PERFORMANCE Georg RoBler Tenovis GmbH &J Co. KG, KleyerstmjJe 94, D-60326 Frankfurt am Main, Germany, Georg.Roessler@tenovis.com Thomas Steinert

More information

WPAN Platform Design in Handset Integrating Cellular Network and Its Application to Mobile Games

WPAN Platform Design in Handset Integrating Cellular Network and Its Application to Mobile Games WPAN Platform Design in Handset Integrating Cellular Network and Its Application to Mobile Games In-Hwan Kim*, Hoo-Jong Kim*, and Gu-Min Jeong** *Mobile Device Development Team 1, Mobile Device & Access

More information

Intelligent Transportation Systems (ITS) for Critical Infrastructure Protection

Intelligent Transportation Systems (ITS) for Critical Infrastructure Protection Intelligent Transportation Systems (ITS) for Critical Infrastructure Protection Presented at the Transportation Research Board January 2002 Annual Meeting Washington DC, USA HAMED BENOUAR Executive Director

More information

ISSN 2319-8885 Vol.03,Issue.35 November-2014, Pages:6974-6978 www.ijsetr.com A Caching Scheme in Location Based Application SANDI WINN AYE 1, ZAR ZAR WINT 2 1 Dept of Information and Communication Technology,

More information

SEXTANT 1. Purpose of the Application

SEXTANT 1. Purpose of the Application SEXTANT 1. Purpose of the Application Sextant has been used in the domains of Earth Observation and Environment by presenting its browsing and visualization capabilities using a number of link geospatial

More information

Optimizing and Managing File Storage in Windows Environments

Optimizing and Managing File Storage in Windows Environments Optimizing and Managing File Storage in Windows Environments A Powerful Solution Based on Microsoft DFS and Virtual File Manager September 2006 TR-3511 Abstract The Microsoft Distributed File System (DFS)

More information

The Next Big Thing. The Enernet The Intersection of Smart Power and Smart Buildings. presented by. Brian Patterson, President

The Next Big Thing. The Enernet The Intersection of Smart Power and Smart Buildings. presented by. Brian Patterson, President The Next Big Thing The Enernet The Intersection of Smart Power and Smart Buildings presented by Brian Patterson, President Reality leaves a lot to the imagination. What is the Next Big Thing? Dreaming

More information

AC Care Mobile Application

AC Care Mobile Application GRD Journals Global Research and Development Journal for Engineering National Conference on Computational Intelligence Systems (NCCIS 17) March 2017 e-issn: 2455-5703 1 Ms. Felicia Lilian.J AP 2 Ananthakrishnan.K

More information

Transaction Processing in a Mobile Computing Environment with Alternating Client Hosts *

Transaction Processing in a Mobile Computing Environment with Alternating Client Hosts * Transaction Processing in a Mobile Computing Environment with Alternating Client Hosts * Sven Buchholz, Thomas Ziegert and Alexander Schill Department of Computer Science Dresden University of Technology

More information

Location-based Services in Ubiquitous Computing Environments

Location-based Services in Ubiquitous Computing Environments Location-based Services in Ubiquitous Computing Environments National Institute of Informatics Email: ichiro@nii.ac.jp Outline 1. Motivation 2. Approach 3. Design and Implementation 4. Applications 5.

More information

Location, Location, Location

Location, Location, Location Location, Location, Location Larry Rudolph 1 Outline Positioning Technology GPS and others Location Specifiers Privacy Issues Universal Location On earth, we need three piece of information: latitude,

More information

Performance Analysis of an Adaptive User Interface System Based on Mobile Agents

Performance Analysis of an Adaptive User Interface System Based on Mobile Agents Performance Analysis of an Adaptive User Interface System Based on Mobile Agents Nikola Mitrović, Jose A. Royo, and Eduardo Mena IIS Department, University of Zaragoza, Maria de Luna 1, 50018 Zaragoza,

More information

A Timer-based Session Setup Procedure in Cellular-WLAN Integrated Systems

A Timer-based Session Setup Procedure in Cellular-WLAN Integrated Systems his paper was presented as part of the Mobility Management in the Networks of the Future World (MobiWorld) Workshop at A -based Session Setup Procedure in Cellular-WLAN Integrated Systems Gwangwoo Park,

More information

ITS (Intelligent Transportation Systems) Solutions

ITS (Intelligent Transportation Systems) Solutions Special Issue Advanced Technologies and Solutions toward Ubiquitous Network Society ITS (Intelligent Transportation Systems) Solutions By Makoto MAEKAWA* Worldwide ITS goals for safety and environment

More information

Kusum Lata, Sugandha Sharma

Kusum Lata, Sugandha Sharma International Journal of Scientific Research in Computer Science, Engineering and Information Technology 2017 IJSRCSEIT Volume 2 Issue 4 ISSN : 2456-3307 A Survey on Cloud Computing and Mobile Cloud Computing

More information

Policy-Based Context-Management for Mobile Solutions

Policy-Based Context-Management for Mobile Solutions Policy-Based Context-Management for Mobile Solutions Caroline Funk 1,Björn Schiemann 2 1 Ludwig-Maximilians-Universität München Oettingenstraße 67, 80538 München caroline.funk@nm.ifi.lmu.de 2 Siemens AG,

More information

PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS

PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS AMANDEEP University College of Engineering, Punjabi University Patiala, Punjab, India amandeep8848@gmail.com GURMEET KAUR University College of Engineering,

More information

Autonomic Applications for Pervasive Environments

Autonomic Applications for Pervasive Environments Autonomic Applications for Pervasive Environments Manish Parashar WINLAB/TASSL ECE, Rutgers University http://www.caip.rutgers.edu/tassl Ack: NSF (CAREER, KDI, ITR, NGS), DoE (ASCI) Pervasive Computing:

More information

Middleware Design Framework for Mobile Computing

Middleware Design Framework for Mobile Computing ISSN: 2222-4254 IJES Middleware Design Framework for Mobile Computing Imran Sarwar Bajwa School of Computer Science, University of Birmingham, Birmingham, B15 2TT, UK i.s.bajwa@cs.bham.ac.uk Abstract.

More information

A System for Discovering Regions of Interest from Trajectory Data

A System for Discovering Regions of Interest from Trajectory Data A System for Discovering Regions of Interest from Trajectory Data Muhammad Reaz Uddin, Chinya Ravishankar, and Vassilis J. Tsotras University of California, Riverside, CA, USA {uddinm,ravi,tsotras}@cs.ucr.edu

More information

Mining GPS logs to augment location models

Mining GPS logs to augment location models Mining GPS logs to augment location models Saraee, M and Yamaner, S Title Authors Type URL Published Date 2005 Mining GPS logs to augment location models Saraee, M and Yamaner, S Conference or Workshop

More information

SENSE AND CACHE A NOVEL CACHING SCHEME FOR MOBILE USERS IN A CELLULAR NETWORK

SENSE AND CACHE A NOVEL CACHING SCHEME FOR MOBILE USERS IN A CELLULAR NETWORK SENSE AND CACHE A NOVEL CACHING SCHEME FOR MOBILE USERS IN A CELLULAR NETWORK C.MALA 1, S.SELVAKUMAR 2 Department of Computer science and Engineering National Institute of technology, Tiruchirappalli,

More information

Root node layer. Sensor node layer. Patient node layer

Root node layer. Sensor node layer. Patient node layer The Mobile Patient: Wireless Distributed Sensor Networks for Patient Monitoring and Care Λ P. Bauer and M. Sichitiu R. Istepanian K. Premaratne Department of EE E-MED System Research Group Department ofece

More information

Handbook of Research on User Interface Design and Evaluation for Mobile Technology

Handbook of Research on User Interface Design and Evaluation for Mobile Technology Handbook of Research on User Interface Design and Evaluation for Mobile Technology Volume I Joanna Lumsden National Research Council of Canada Institute for Information Technology e-business, Canada InformatIon

More information

CSE 535 Mobile Computing. An Overview of Mobile Computing: Part I Motivation and Challenges

CSE 535 Mobile Computing. An Overview of Mobile Computing: Part I Motivation and Challenges CSE 535 Mobile Computing An Overview of Mobile Computing: Part I Motivation and Challenges Georgios Varsamopoulos School of Computing and Informatics Arizona State University 2 Mobile Computing The need

More information

A Study of Future Internet Applications based on Semantic Web Technology Configuration Model

A Study of Future Internet Applications based on Semantic Web Technology Configuration Model Indian Journal of Science and Technology, Vol 8(20), DOI:10.17485/ijst/2015/v8i20/79311, August 2015 ISSN (Print) : 0974-6846 ISSN (Online) : 0974-5645 A Study of Future Internet Applications based on

More information

Siniša Husnjak A1 Direkt ABSTRACT

Siniša Husnjak A1 Direkt ABSTRACT Dragan Peraković Vladimir Remenar University of Zagreb Faculty of Transport and Traffic Sciences Vukeliceva 4, HR - 10000 Zagreb, Croatia dragan.perakovic@fpz.hr, vladimir.remenar@fpz.hr Siniša Husnjak

More information

TWO APPROACHES IN SYSTEM MODELING AND THEIR ILLUSTRATIONS WITH MDA AND RM-ODP

TWO APPROACHES IN SYSTEM MODELING AND THEIR ILLUSTRATIONS WITH MDA AND RM-ODP TWO APPROACHES IN SYSTEM MODELING AND THEIR ILLUSTRATIONS WITH MDA AND RM-ODP Andrey Naumenko, Alain Wegmann Laboratory of Systemic Modeling, Swiss Federal Institute of Technology - Lausanne, EPFL-I&C-LAMS,1015

More information

Transaction Processing in Mobile Database Systems

Transaction Processing in Mobile Database Systems Ashish Jain* 1 http://dx.doi.org/10.18090/samriddhi.v7i2.8631 ABSTRACT In a mobile computing environment, a potentially large number of mobile and fixed users may simultaneously access shared data; therefore,

More information

SHORTEST PATH ANALYSES IN RASTER MAPS FOR PEDESTRIAN NAVIGATION IN LOCATION BASED SYSTEMS

SHORTEST PATH ANALYSES IN RASTER MAPS FOR PEDESTRIAN NAVIGATION IN LOCATION BASED SYSTEMS SHORTEST PATH ANALYSES IN RASTER MAPS FOR PEDESTRIAN NAVIGATION IN LOCATION BASED SYSTEMS V. Walter, M. Kada, H. Chen Institute for Photogrammetry, Stuttgart University, Geschwister-Scholl-Str. 24 D, D-70174

More information

The Value of Automated Penetration Testing White Paper

The Value of Automated Penetration Testing White Paper The Value of Automated Penetration Testing White Paper Overview As an information security expert and the security manager of the company, I am well aware of the difficulties of enterprises and organizations

More information

Wireless and Mobile Networks Reading: Sections 2.8 and 4.2.5

Wireless and Mobile Networks Reading: Sections 2.8 and 4.2.5 Wireless and Mobile Networks Reading: Sections 2.8 and 4.2.5 Acknowledgments: Lecture slides are from Computer networks course thought by Jennifer Rexford at Princeton University. When slides are obtained

More information

New Trends in Database Systems

New Trends in Database Systems New Trends in Database Systems Ahmed Eldawy 9/29/2016 1 Spatial and Spatio-temporal data 9/29/2016 2 What is spatial data Geographical data Medical images 9/29/2016 Astronomical data Trajectories 3 Application

More information

DEFINITION OF SUITABLE SIMULATION SCENARIOS FOR DYNAMIC INVESTIGATIONS IN CELLULAR NETWORKS WITH STEAM

DEFINITION OF SUITABLE SIMULATION SCENARIOS FOR DYNAMIC INVESTIGATIONS IN CELLULAR NETWORKS WITH STEAM DEFINITION OF SUITABLE SIMULATION SCENARIOS FOR DYNAMIC INVESTIGATIONS IN CELLULAR NETWORKS WITH STEAM Holger Pampel Enrico Jugl Lucent Technologies Network Systems GmbH Thurn-und-Taxis Strasse 10 90411

More information

CrowdPath: A Framework for Next Generation Routing Services using Volunteered Geographic Information

CrowdPath: A Framework for Next Generation Routing Services using Volunteered Geographic Information CrowdPath: A Framework for Next Generation Routing Services using Volunteered Geographic Information Abdeltawab M. Hendawi, Eugene Sturm, Dev Oliver, Shashi Shekhar hendawi@cs.umn.edu, sturm049@umn.edu,

More information

Chapter 7. Telecommunications, the Internet, and Wireless Technology

Chapter 7. Telecommunications, the Internet, and Wireless Technology Chapter 7 Telecommunications, the Internet, and Wireless Technology LEARNING OBJECTIVES What are the principal components of telecommunications networks and key networking technologies? What are the different

More information

Kevwe Edewor & Adam Hardy 14th December C05 Software Engineering

Kevwe Edewor & Adam Hardy 14th December C05 Software Engineering Mobile Computing Kevwe Edewor & Adam Hardy 14th December 2001 3C05 Software Engineering Objectives Define Mobile Computing and look at current trends Distinguish between types of Mobility Examine Theory

More information

Experimental Analysis of the Femtocell Location Verification Techniques

Experimental Analysis of the Femtocell Location Verification Techniques Experimental Analysis of the Femtocell Location Verification Techniques Ravishankar Borgaonkar, Kevin Redon and Jean-Pierre Seifert Security in Telecommunication Technical University Berlin and Deutsche

More information

Boosting Business Development with Citywide Wireless Access

Boosting Business Development with Citywide Wireless Access Customer Case Study Boosting Business Development with Citywide Wireless Access The City of Dublin, Ohio is using Cisco networking solutions to enhance business development, while providing better public

More information

FROM A RELATIONAL TO A MULTI-DIMENSIONAL DATA BASE

FROM A RELATIONAL TO A MULTI-DIMENSIONAL DATA BASE FROM A RELATIONAL TO A MULTI-DIMENSIONAL DATA BASE David C. Hay Essential Strategies, Inc In the buzzword sweepstakes of 1997, the clear winner has to be Data Warehouse. A host of technologies and techniques

More information

Part I. Wireless Communication

Part I. Wireless Communication 1 Part I. Wireless Communication 1.5 Topologies of cellular and ad-hoc networks 2 Introduction Cellular telephony has forever changed the way people communicate with one another. Cellular networks enable

More information

Internet Architecture

Internet Architecture Internet Architecture Lecture 8: How Wireless Connections and WiFi Work Assistant Teacher Samraa Adnan Al-Asadi 1 Introduction The wired world created a revolution of allowing people to connect to the

More information