Somo Banerjee


Published on

  • Be the first to comment

  • Be the first to like this

Somo Banerjee

  1. 1. Software Engineering for Mobility: Yet Another Roadmap Gruia-Catalin Roman, Gian Pietro Picco, Amy L. Murphy Presenter: Somo Banerjee "The future lies in designing and selling computers that people don't realize are computers at all“ Adam Osborne
  2. 2. Major trends in Computing
  3. 3. Evolution <ul><li>Computing </li></ul><ul><li>-------------- </li></ul><ul><li>Personal Computing - PC </li></ul><ul><li>Distributed Computing - LAN, WAN, Grid </li></ul><ul><li>Web Computing - WWW </li></ul><ul><li>Mobile Computing - PDAs, Cell Phones, SmartPhones </li></ul><ul><li>Pervasive Computing - !!! </li></ul>
  4. 4. Summarizing this Paper – 1 <ul><li>Mobile Computing </li></ul><ul><li>-------------------------- </li></ul><ul><li>No fixed network structure </li></ul><ul><li>Nodes may come and go </li></ul><ul><li>Processes may move among nodes </li></ul><ul><li>Programs may evolve and change structure </li></ul>
  5. 5. Constants are now Variables <ul><li>Variable Properties </li></ul><ul><li>---------------------------------- </li></ul><ul><li>Location </li></ul><ul><li>Environment </li></ul><ul><li>Connectivity </li></ul><ul><li>Bandwidth </li></ul><ul><li>I/O devices </li></ul><ul><li>Security Domain </li></ul>
  6. 6. DREAM Environment <ul><li>Issues </li></ul><ul><li>----------- </li></ul><ul><li>Temporary (?) loss of network connectivity </li></ul><ul><li>Ad-hoc Resource Discovery </li></ul><ul><li>Scarce Resources </li></ul><ul><li>Low Battery Power </li></ul><ul><li>Slow CPU Speed </li></ul><ul><li>Small amount of Memory </li></ul><ul><li>Frequent and unannounced changes in the environment </li></ul>
  7. 7. DREAMy Devices Comparison of some mobile devices --------------------------------------------
  8. 8. Requirements for Mobility <ul><li>Dynamic Reconfiguration </li></ul><ul><li>Adaptivity </li></ul><ul><li>Asynchronous Interaction </li></ul><ul><li>Context-Awareness </li></ul><ul><li>Lightweight Middleware </li></ul>
  9. 9. Summarizing this Paper - 2 <ul><li>Critical Dimensions </li></ul><ul><li>---------------------------- </li></ul><ul><li>Space </li></ul><ul><li>Coordination </li></ul>
  10. 10. Summarizing this Paper - 3 <ul><li>Space </li></ul><ul><li>------- </li></ul><ul><li>Physical Mobility </li></ul><ul><li>Logical Mobility </li></ul>
  11. 11. Summarizing this Paper - 4 <ul><li>Coordination </li></ul><ul><li>------------------ </li></ul><ul><li>Resource Discovery </li></ul><ul><li>(Extent of) Knowledge about a Resource </li></ul><ul><li>Synchronization </li></ul><ul><li>Exchange of Information/Data/Code </li></ul>
  12. 12. Summarizing this Paper - 5 <ul><li>Software Engineering </li></ul><ul><li>------------------------------- </li></ul><ul><li>Models </li></ul><ul><li>Algorithms </li></ul>
  13. 13. Summarizing this Paper - 6 <ul><li>Models </li></ul><ul><li>---------- </li></ul><ul><li>Unit of mobility </li></ul><ul><li>Location </li></ul><ul><li>Context </li></ul><ul><li>Coordination Mechanism </li></ul>
  14. 14. Summarizing this Paper - 7 <ul><li>Algorithms </li></ul><ul><li>---------------- </li></ul><ul><li>Control and manage location information of self and </li></ul><ul><li>neighbors </li></ul><ul><li>Spatial knowledge </li></ul><ul><li>Mobile component interaction and communication </li></ul><ul><li>Connectivity </li></ul><ul><li>Power Efficiency </li></ul>
  15. 15. Summarizing this Paper - 8 <ul><li>Systems Research </li></ul><ul><li>---------------------- </li></ul><ul><li>Applications </li></ul><ul><li>Middleware </li></ul>
  16. 16. Summarizing this Paper - 9 Applications ---------------
  17. 17. Styles of Interaction <ul><li>Nomadic interaction </li></ul><ul><li>Ad-hoc interaction </li></ul><ul><li>Presence (“Find me”) interaction </li></ul>
  18. 18. Summarizing this Paper – 10 <ul><li>Middleware </li></ul><ul><li>--------------- </li></ul><ul><li>Logical Mobility is a design tool </li></ul><ul><li>Physical Mobility is a requirement </li></ul>
  19. 19. A Simple(?) Mobile Application <ul><li>Central DB: e-Shopping Center </li></ul><ul><li>PC: Belongs to a pair of customers who are also married to each other </li></ul><ul><li>PDAs: One belonging to each of these two customers </li></ul>E-Shopping System Snapshot
  20. 20. Middleware for Mobile Computing <ul><li>Transparency or Awareness? </li></ul><ul><li>----------------------------------- </li></ul><ul><li>Replication </li></ul><ul><li>Context </li></ul><ul><li>Location </li></ul>
  21. 21. Replication <ul><li>How to Replicate? </li></ul><ul><li>When to Replicate? </li></ul><ul><li>How much to Replicate? </li></ul>
  22. 22. Context <ul><li>Conflict Management </li></ul><ul><li>Commit Protocol </li></ul><ul><li>Knowledge about Environment </li></ul>
  23. 23. Location <ul><li>Where? </li></ul><ul><li>When? </li></ul><ul><li>Whom? </li></ul>
  24. 24. Mobile Middleware Technologies - 1 <ul><li>Reflective </li></ul><ul><li>-- OpenCorba, Open-ORB, DynamicTAO, XMIDDLE </li></ul><ul><li>Tuple Space </li></ul><ul><li>-- LIME, TSpaces, JavaSpaces </li></ul><ul><li>Context-Aware </li></ul><ul><li>-- Nexus </li></ul><ul><li>Event-Based </li></ul><ul><li>-- Hermes </li></ul>
  25. 25. Mobile Middleware Technologies - 2
  26. 26. Some Viewpoints - 1 <ul><li>By 2005, the typical cell phone will be indistinguishable from a PDA, and at least one U.S. carrier will support both 802.11 and 2.5G or 3G on the same devices. </li></ul><ul><li>As an unexpected consequence of this dual-band support, we'll see some instances of bottom-up networks, where devices connect directly with each other on a peer-to-peer basis. This will be a viable alternative to the current monopoly of carriers' antennas. </li></ul><ul><li>-- John Jordan, principal, office of the chief technologist, Cap Gemini Ernst & Young U.S. LLC, Cambridge, Mass. </li></ul><ul><li>&quot; Can I get it with side-by-side doors, an ice dispenser and a GSM connection in harvest gold?&quot; </li></ul><ul><li>There's always been a lot of talk about networking home appliances, but little action due to the difficulties of pulling wire or making networking run over power lines. But inexpensive networking running over public cellular networks will finally make possible next-generation applications, like a refrigerator that hosts a Web site listing what groceries a family needs and accepts bids from the local stores that want their business. </li></ul><ul><li>And, of course, a screen on a refrigerator represents an amazing advertising opportunity for Duncan Hines, Kraft and every other food company. Retailer Fry's Electronics already has a refrigerator with an RJ45 jack installed. Cellular is just around the corner. </li></ul><ul><li>-- Sheldon Laube, chairman, CenterBeam Inc., Santa Clara, Calif. </li></ul>
  27. 27. Some Viewpoints - 2 <ul><li>As more and more nonvocal transactions are performed on our mobile phones, these devices will become the holder of our identities within the next five years. Much like the role of a driver's license, our mobile communications device will serve to authenticate individuals and securely contain credentials and certificates. Biometrics, embedded appropriately, would thwart identity theft . -- Peter Athanas, associate professor, Department of Electrical and Computer Engineering, Virginia Polytechnic Institute and State University, Blacksburg, Va. </li></ul><ul><li>Within the next five years, all front-end user interfaces for computing will be wireless. -- Sumit Deshpande and Don LeClair, technology strategists, Computer Associates International Inc., Islandia, N.Y. </li></ul><ul><li>By 2005, mobile access to information will seem as natural as remote control of a TV. In fact, we'll wonder why we spent so much time at a desk. -- Jacob Christfort, chief technology officer for the Mobile Products and Services Division, Oracle Corp. </li></ul>
  28. 28. Virus!!! <ul><li>[June 23, 2004]   </li></ul><ul><li>Mobile Computing Security Through Obscurity </li></ul><ul><li>Last week, Kaspersky Labs announced the discovery of the first virus to infect mobile phones. The virus, which Kaspersky named Cabir, affects mobile phones that use the Symbian OS. The virus is relatively harmless--its only purpose is to propagate itself, and it does so only to other phones that have Bluetooth enabled and are broadcasting their presence. However, Denis Zenkin, head of Corporate Communications at Kaspersky Labs, said that sooner or later, more malicious forms of mobile phone malware that will possibly destroy or steal data will begin to spread. </li></ul><ul><li>http://www. windowsitpro .com/Article/ ArticleID /43071/43071.html </li></ul>
  29. 29. Virus!!! <ul><li>BRADOR TROJAN (WINDOWS CE) </li></ul><ul><li>MOSQUIT TROJAN (SYMBIAN) </li></ul><ul><li>NETSEC Security Brief October 2004 titled “ Mobile Computing Security Threats ” </li></ul>
  30. 30. So! The Other Side <ul><li>Security </li></ul><ul><li>Trust </li></ul><ul><li>Privacy </li></ul>
  31. 31. Before you go <ul><li>Four probable areas of research </li></ul><ul><li>------------------------------------ </li></ul><ul><li>Reconfigurable Systems </li></ul><ul><li>Context Modeling </li></ul><ul><li>Security-Trust-Privacy </li></ul><ul><li>Efficient Wireless Connectivity </li></ul>
  32. 32. About the Paper - Positives <ul><li>Nice analysis of Mobility in comparison with Distributed Systems </li></ul><ul><li>Critical Dimensions recognized </li></ul><ul><li>Theory Issues well-treated </li></ul>
  33. 33. About the Paper - Negatives <ul><li>Verbose </li></ul><ul><li>Security and Resource Constraint are not treated as first-class concerns </li></ul><ul><li>Does not categorically mention areas where research needs to be done, rather leaves them as suggestions </li></ul>