SlideShare a Scribd company logo
1 of 17
Ubiquitous Networking
Next Generation Service Platform
Users expectation towards
Next Generation
 Users expectation toward the next generation
service is not just to provide a large bandwidth.
 They would rather expect to maintain or enhance
their overall living environment, such as safety,
security, amenity and feeling ease with the
surrounding environment or within their community .
 They are not aware which communication
method they use .
Introduction to Ubiquitous network
Ubiquitous network is a context-aware
network of computing devices which are
connected at any place, anytime and with
any object
Ubiquitous network allows all users to access
and exchange information of any kind freely
at anytime, from anywhere, and from any
appliance through the use of broadband and
mobile access.
Combines optical communication, mobile
and consumer electronics into one network
What is Ubiquitous Networking ?
 Ubiquitous : Omnipresence
 Computing Everywhere
 Content Everywhere
 Connectivity Everywhere
 Seamless Connection and Service
 Location, Context & Preference-Aware Service
The role of ubiquitous network
The role of ubiquitous network should seek for fulfilling
such user needs in corporation with use terminal and
service platform.
Keyword is “context awareness” for a user.
Context means user’s general situation such as user’s
location, user’s access status, etc.
By always keeping aware of user’s context, a system
can offer the best service that he/she wants.
Applications Of Ubiquitous Networking
Use of Ubi-net in Household
Applications Of Ubiquitous Networking
Use of Ubi-net in GPS car tracking system
Background and assumptions
 Third generation cellular system is becoming
dominant and person-to-person call is mostly made by
cellular.
 Fixed broadband services will come into home
environment widely. Users will enjoy broadband access
both at office and home.
 Not only person-to-person communications, but other
communications style such as machine-to-machine
communications are gradually becoming popular.
Enablers
9
The following items are several possible enablers for
ubiquitous networking paradigm;
Advent of high-end mobiles which support 3G capability,
location, middleware environment, sensors, etc.
RFID technology with which man-to-environment
interactions much easier.
Ontology which deals with objects on the Web more
semantic way than ever.
Hi-end mobiles Ontology
#book
“the NGN”
ITU-T SG13
name
 Network Routing and Control
 Support for mobility
 Network N Service control
 Network self configuration
 Adaptive service control
 Context awareness
 Profile Management
 Support for collaboration
Issues in Ubiquitous Network
Management
Challenges in Ubiquitous Network
Management
The main challenges in ubiquitous network management are :
 Seamless connectivity
 Context awareness
 Resource management
 Device management
Always-on connectivity
Network Interface Management
Interface co-existence
Challenges in Seamless
Connectivity
Challenges in context awareness
Management
 Filtering
 Context – composition
 Adaptation
 Discovery of context
 Storage of context
 Access control on context
Challenges in Resource
Management
 Resource Dissemination: Information about
machine resources
 Resource Discovery :Mechanism by which
applications find resource information
 Scheduling Resources: Grids (Large scale
network computing system) decide which
resources are assigned to which jobs
Challenges in Device
Management:
Device Identification
Device adaptability
Device Tracking
Flexible service platform is the key
From the ubiquitous service point of view, an
ubiquitous network should have:
Flexible service platform execution
environment with common API,
Super high performance switching and
routing capability,
Broadband service capability,
Relevant adaptive routing mechanism.

More Related Content

What's hot

Cloud of things (IoT + Cloud Computing)
Cloud of things (IoT + Cloud Computing)Cloud of things (IoT + Cloud Computing)
Cloud of things (IoT + Cloud Computing)Zakaria Hossain
 
Pervasive Computing
Pervasive ComputingPervasive Computing
Pervasive ComputingSangeetha Sg
 
Human Computer Interface (HCI)
Human Computer Interface (HCI)Human Computer Interface (HCI)
Human Computer Interface (HCI)Shobha Rani
 
Ubiquitous computing
Ubiquitous computingUbiquitous computing
Ubiquitous computingPriti Punia
 
Business models for business processes on IoT
Business models for business processes on IoTBusiness models for business processes on IoT
Business models for business processes on IoTFabMinds
 
Mobile Computing I-Unit Notes
Mobile Computing I-Unit NotesMobile Computing I-Unit Notes
Mobile Computing I-Unit Notesgouse_1210
 
Internet of Things A Vision, Architectural Elements, and Future Directions
Internet of Things A Vision, Architectural Elements, and Future Directions Internet of Things A Vision, Architectural Elements, and Future Directions
Internet of Things A Vision, Architectural Elements, and Future Directions Mostafa Arjmand
 
Iot and cloud computing
Iot and cloud computingIot and cloud computing
Iot and cloud computingeteshagarwal1
 
Airborne Internet
Airborne InternetAirborne Internet
Airborne InternetLokesh Loke
 
Pervasive computing and its Security Issues
Pervasive computing and its Security IssuesPervasive computing and its Security Issues
Pervasive computing and its Security IssuesPhearin Sok
 
eye phone technology
eye phone technologyeye phone technology
eye phone technologyNaga Dinesh
 
Cloud interoperability
Cloud interoperabilityCloud interoperability
Cloud interoperabilitygaurav jain
 
SDN( Software Defined Network) and NFV(Network Function Virtualization) for I...
SDN( Software Defined Network) and NFV(Network Function Virtualization) for I...SDN( Software Defined Network) and NFV(Network Function Virtualization) for I...
SDN( Software Defined Network) and NFV(Network Function Virtualization) for I...Sagar Rai
 
Virtual Network Computing
Virtual Network ComputingVirtual Network Computing
Virtual Network Computingrojalina nanda
 
Context-Aware Computing
Context-Aware ComputingContext-Aware Computing
Context-Aware Computinglogus2k
 

What's hot (20)

Virtual keyboard abstract
Virtual keyboard abstractVirtual keyboard abstract
Virtual keyboard abstract
 
Ubiquitous computing
Ubiquitous computingUbiquitous computing
Ubiquitous computing
 
Cloud of things (IoT + Cloud Computing)
Cloud of things (IoT + Cloud Computing)Cloud of things (IoT + Cloud Computing)
Cloud of things (IoT + Cloud Computing)
 
Pervasive Computing
Pervasive ComputingPervasive Computing
Pervasive Computing
 
Human Computer Interface (HCI)
Human Computer Interface (HCI)Human Computer Interface (HCI)
Human Computer Interface (HCI)
 
Ubiquitous computing
Ubiquitous computingUbiquitous computing
Ubiquitous computing
 
Pervasive Computing
Pervasive ComputingPervasive Computing
Pervasive Computing
 
Business models for business processes on IoT
Business models for business processes on IoTBusiness models for business processes on IoT
Business models for business processes on IoT
 
Futex ppt
Futex  pptFutex  ppt
Futex ppt
 
Mobile Computing I-Unit Notes
Mobile Computing I-Unit NotesMobile Computing I-Unit Notes
Mobile Computing I-Unit Notes
 
Internet of Things A Vision, Architectural Elements, and Future Directions
Internet of Things A Vision, Architectural Elements, and Future Directions Internet of Things A Vision, Architectural Elements, and Future Directions
Internet of Things A Vision, Architectural Elements, and Future Directions
 
Iot and cloud computing
Iot and cloud computingIot and cloud computing
Iot and cloud computing
 
Airborne Internet
Airborne InternetAirborne Internet
Airborne Internet
 
Ch18 service oriented software engineering
Ch18 service oriented software engineeringCh18 service oriented software engineering
Ch18 service oriented software engineering
 
Pervasive computing and its Security Issues
Pervasive computing and its Security IssuesPervasive computing and its Security Issues
Pervasive computing and its Security Issues
 
eye phone technology
eye phone technologyeye phone technology
eye phone technology
 
Cloud interoperability
Cloud interoperabilityCloud interoperability
Cloud interoperability
 
SDN( Software Defined Network) and NFV(Network Function Virtualization) for I...
SDN( Software Defined Network) and NFV(Network Function Virtualization) for I...SDN( Software Defined Network) and NFV(Network Function Virtualization) for I...
SDN( Software Defined Network) and NFV(Network Function Virtualization) for I...
 
Virtual Network Computing
Virtual Network ComputingVirtual Network Computing
Virtual Network Computing
 
Context-Aware Computing
Context-Aware ComputingContext-Aware Computing
Context-Aware Computing
 

Similar to Ubiquitous networking

Quality Metrics In Ubiquitous Computing
Quality Metrics In Ubiquitous ComputingQuality Metrics In Ubiquitous Computing
Quality Metrics In Ubiquitous ComputingRutvik Pensionwar
 
Security Attacks And Solutions On Ubiquitous Computing Networks
Security Attacks And Solutions On Ubiquitous Computing NetworksSecurity Attacks And Solutions On Ubiquitous Computing Networks
Security Attacks And Solutions On Ubiquitous Computing NetworksAhmad Sharifi
 
Global IoT Technology and Digital transformation
Global IoT Technology and Digital transformationGlobal IoT Technology and Digital transformation
Global IoT Technology and Digital transformationSANDEEP MITTAPALLY
 
Ubiquitous computing
Ubiquitous computingUbiquitous computing
Ubiquitous computingValeria Gasik
 
Nomadic Computing with Mobile Devices
Nomadic Computing with Mobile DevicesNomadic Computing with Mobile Devices
Nomadic Computing with Mobile DevicesCognizant
 
Pervasivecomputing 140422034057-phpapp02
Pervasivecomputing 140422034057-phpapp02Pervasivecomputing 140422034057-phpapp02
Pervasivecomputing 140422034057-phpapp02Pravallika Reddy
 
Mobile computing
Mobile computingMobile computing
Mobile computingLi Zhao
 
A Study Mobile Computing
A Study   Mobile ComputingA Study   Mobile Computing
A Study Mobile ComputingSara Alvarez
 
Pervasive computing
Pervasive computingPervasive computing
Pervasive computingPreethi AKNR
 
Mobile computing
Mobile computingMobile computing
Mobile computingpooja s p
 
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...Editor IJCATR
 
A Posteriori Perusal of Mobile Computing
A Posteriori Perusal of Mobile ComputingA Posteriori Perusal of Mobile Computing
A Posteriori Perusal of Mobile ComputingEditor IJCATR
 
A Posteriori Perusal of Mobile Computing
A Posteriori Perusal of Mobile ComputingA Posteriori Perusal of Mobile Computing
A Posteriori Perusal of Mobile ComputingEditor IJCATR
 
Unit_1_IOT_INTRO.pptx
Unit_1_IOT_INTRO.pptxUnit_1_IOT_INTRO.pptx
Unit_1_IOT_INTRO.pptxBharat Tank
 

Similar to Ubiquitous networking (20)

Quality Metrics In Ubiquitous Computing
Quality Metrics In Ubiquitous ComputingQuality Metrics In Ubiquitous Computing
Quality Metrics In Ubiquitous Computing
 
Security Attacks And Solutions On Ubiquitous Computing Networks
Security Attacks And Solutions On Ubiquitous Computing NetworksSecurity Attacks And Solutions On Ubiquitous Computing Networks
Security Attacks And Solutions On Ubiquitous Computing Networks
 
Global IoT Technology and Digital transformation
Global IoT Technology and Digital transformationGlobal IoT Technology and Digital transformation
Global IoT Technology and Digital transformation
 
Ubiquitous computing
Ubiquitous computingUbiquitous computing
Ubiquitous computing
 
Nomadic Computing with Mobile Devices
Nomadic Computing with Mobile DevicesNomadic Computing with Mobile Devices
Nomadic Computing with Mobile Devices
 
Pervasivecomputing 140422034057-phpapp02
Pervasivecomputing 140422034057-phpapp02Pervasivecomputing 140422034057-phpapp02
Pervasivecomputing 140422034057-phpapp02
 
module-1 part a.pptx
module-1 part a.pptxmodule-1 part a.pptx
module-1 part a.pptx
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 
module -1 fuill notes.pdf
module -1 fuill notes.pdfmodule -1 fuill notes.pdf
module -1 fuill notes.pdf
 
A Study Mobile Computing
A Study   Mobile ComputingA Study   Mobile Computing
A Study Mobile Computing
 
Pervasive computing
Pervasive computingPervasive computing
Pervasive computing
 
PERVASIVE COMPUTING
PERVASIVE COMPUTINGPERVASIVE COMPUTING
PERVASIVE COMPUTING
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...
 
A Posteriori Perusal of Mobile Computing
A Posteriori Perusal of Mobile ComputingA Posteriori Perusal of Mobile Computing
A Posteriori Perusal of Mobile Computing
 
A Posteriori Perusal of Mobile Computing
A Posteriori Perusal of Mobile ComputingA Posteriori Perusal of Mobile Computing
A Posteriori Perusal of Mobile Computing
 
27 32
27 3227 32
27 32
 
27 32
27 3227 32
27 32
 
Unit_1_IOT_INTRO.pptx
Unit_1_IOT_INTRO.pptxUnit_1_IOT_INTRO.pptx
Unit_1_IOT_INTRO.pptx
 
Mobile Computing
Mobile ComputingMobile Computing
Mobile Computing
 

Recently uploaded

Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .Satyam Kumar
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)dollysharma2066
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxk795866
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2RajaP95
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 

Recently uploaded (20)

Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdfDesign and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes  examplesPOWER SYSTEMS-1 Complete notes  examples
POWER SYSTEMS-1 Complete notes examples
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Serviceyoung call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
 

Ubiquitous networking

  • 2. Users expectation towards Next Generation  Users expectation toward the next generation service is not just to provide a large bandwidth.  They would rather expect to maintain or enhance their overall living environment, such as safety, security, amenity and feeling ease with the surrounding environment or within their community .  They are not aware which communication method they use .
  • 3. Introduction to Ubiquitous network Ubiquitous network is a context-aware network of computing devices which are connected at any place, anytime and with any object Ubiquitous network allows all users to access and exchange information of any kind freely at anytime, from anywhere, and from any appliance through the use of broadband and mobile access. Combines optical communication, mobile and consumer electronics into one network
  • 4. What is Ubiquitous Networking ?  Ubiquitous : Omnipresence  Computing Everywhere  Content Everywhere  Connectivity Everywhere  Seamless Connection and Service  Location, Context & Preference-Aware Service
  • 5. The role of ubiquitous network The role of ubiquitous network should seek for fulfilling such user needs in corporation with use terminal and service platform. Keyword is “context awareness” for a user. Context means user’s general situation such as user’s location, user’s access status, etc. By always keeping aware of user’s context, a system can offer the best service that he/she wants.
  • 6. Applications Of Ubiquitous Networking Use of Ubi-net in Household
  • 7. Applications Of Ubiquitous Networking Use of Ubi-net in GPS car tracking system
  • 8. Background and assumptions  Third generation cellular system is becoming dominant and person-to-person call is mostly made by cellular.  Fixed broadband services will come into home environment widely. Users will enjoy broadband access both at office and home.  Not only person-to-person communications, but other communications style such as machine-to-machine communications are gradually becoming popular.
  • 9. Enablers 9 The following items are several possible enablers for ubiquitous networking paradigm; Advent of high-end mobiles which support 3G capability, location, middleware environment, sensors, etc. RFID technology with which man-to-environment interactions much easier. Ontology which deals with objects on the Web more semantic way than ever. Hi-end mobiles Ontology #book “the NGN” ITU-T SG13 name
  • 10.
  • 11.  Network Routing and Control  Support for mobility  Network N Service control  Network self configuration  Adaptive service control  Context awareness  Profile Management  Support for collaboration Issues in Ubiquitous Network Management
  • 12. Challenges in Ubiquitous Network Management The main challenges in ubiquitous network management are :  Seamless connectivity  Context awareness  Resource management  Device management
  • 13. Always-on connectivity Network Interface Management Interface co-existence Challenges in Seamless Connectivity
  • 14. Challenges in context awareness Management  Filtering  Context – composition  Adaptation  Discovery of context  Storage of context  Access control on context
  • 15. Challenges in Resource Management  Resource Dissemination: Information about machine resources  Resource Discovery :Mechanism by which applications find resource information  Scheduling Resources: Grids (Large scale network computing system) decide which resources are assigned to which jobs
  • 16. Challenges in Device Management: Device Identification Device adaptability Device Tracking
  • 17. Flexible service platform is the key From the ubiquitous service point of view, an ubiquitous network should have: Flexible service platform execution environment with common API, Super high performance switching and routing capability, Broadband service capability, Relevant adaptive routing mechanism.