SlideShare a Scribd company logo
1 of 6
Download to read offline
IOSR Journal of Computer Engineering (IOSR-JCE)
e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 6, Ver. IV (Nov – Dec. 2015), PP 102-107
www.iosrjournals.org
DOI: 10.9790/0661-1764102107 www.iosrjournals.org 102 | Page
MANCAFChat - An Application to Evaluate MANCAF
Framework
Mr. Hardik S. Mehta1
, Dr. Dhaval R. Kathiriya2
1
(Research Scholar, School of Computer Science, RK University, Rajkot)
2
(Director IT, Anand Agriculture University, Anand)
Abstract: The collaborative application uses the MANET to exchange the information between the available
nodes. The development of such kind of application takes too much time to implement the network
communication services. This paper describes the implementation of MANCAF framework by developing
collaborative application named MANCAFChat. It was designed based on the MANCAF framework. The main
purpose behind the design of such application is to evaluate the effectiveness of MANCAF framework and
usefulness of collaborative application.
Keywords: Collaborative Application, MANCAF Framework, MANET
I. Introduction
For last few decades, commercial and personal community were interested in the Computer Supported
Cooperative Work (CSCW) [1] area and in mobile computing [2]. CSCW engages the study of how persons
work together using network technology, and related software, hardware, techniques and services [3].
Wireless devices support different PAN technologies which includes IrDA, Bluetooth [4]. This
technology can be used to transfer the data between mobile devices. It can be visualized as a digital sphere near
the mobile device which support a collaborative network for users in a range. A MANET can be utilized to
exchange the data between people with mobile devices. In MANET, devices can connect to and disconnect from
the network dynamically making the topology unstable and random. Mobile devices in MANET can
communicate with each other by initiating direct request by user, automatically by mobile device or hybrid of
this two [5].
The new development in wireless technologies, mobile phones and programming languages for mobile
phones have made possible to transfer the wired computing to a wireless network [6], [7]. The P2P architecture
patterns fits very well to execute collaborative applications with nodes of network represent the users and the
network between nodes represents the collaborative links among users. MANETs with the use of IrDA,
Bluetooth and Wi-Fi allow a new kind of collaborative application to users that are actually collocated.
In [8], we proposed MANCAF framework to support collaborative application development for mobile
device in short span of time. Main idea behind the framework is to present an advanced programming
framework to developers so that they only need to use simple methods to manage the different task of MANET.
The rest of the paper is ordered as follows. Section 2 describes the MANCAF framework on which
MANCAFChat application built. Section 3 describes the architectural design of MANCAFChat application.
Section 4 describes the evaluation of MANCAFChat application and MANCAF framework. Section 5 describes
the related framework. Finally, Section 6 concludes the paper.
II. MANCAF Framework
The design of MANCAF is based on layered architecture to provide features like modularity and
simplicity. Each layer is assigned a specific responsibility and it is based on the below layer. The drawback of
this approach could be slower execution of application if it contains many layers to perform operation.
MANCAF framework can be used in mobile devices which have limited resources so we limit the number of
layers used in the architecture. Fig 1 shows the compact design of framework and Fig 2 shows the high-level
design of framework.
MANCAFChat - An Application to Evaluate MANCAF Framework
DOI: 10.9790/0661-1764102107 www.iosrjournals.org 103 | Page
Figure 1 Compact Design
The MANCAF architecture contains the following part:
Device: It represents the mobile devices which run the application develop using framework. Two or more
devices create ad-hoc network.
Group: It is logical collection of devices within communication range and aware of each other’s existence. All
devices can communicate with each other in a group.
Service: It is a unique ID for the device application running the MANCAF framework. The application which
runs the same service can able to communicate with each other.
Network: It represents the communication medium used in the framework to communicate with neighbor
devices.
Message: It is an entity which represents the different kinds of data transfer between devices. It can be sent to
single device or a group of devices. It can contain text, objects or binary data like images, video or audio.
Session: It represent the duration of all communications between devices in a group. It maintains information
about devices, group and communication medium.
Framework: It is core entity between application and system. It provide interface to developer and hides the
complexity.
Application: It is application developed on some platform using MANCAF framework. It controls the
framework.
Figure 2 High Level Design
Table 1 shows the important list of requirements which framework needs to fulfil in order to design
collaborative application. These requirements are identified by the analysis of scenario [8].
Table 1
ID Requirement description
R1 The framework must be able to support mobile devices
R2 The framework must work with different network mediums
R3 The derived application must not be dependent on what network medium is used by framework.
R4 The framework must be able to create a network without any central device
R5 The framework must be able to create a group of more than one devices
R6 The framework must be able to transfer the data to different connected devices
R7 The framework allows the application to form a new group or join existing group
R8 The framework must provide searching facility to find the existing group
R9 The framework able to query the application for any arriving or leaving connection
R10 The framework must notify about new device joining notification to every connected devices.
R11 The framework must be able to maximum the number of devices in a group
MANCAFChat - An Application to Evaluate MANCAF Framework
DOI: 10.9790/0661-1764102107 www.iosrjournals.org 104 | Page
R12 The framework must be able to identify the source which originate the transfer
R13 The framework must be able to send the same data to multiple devices
R14 The framework must allow the continuous searching of group
R15 The framework must support different resource management technique to balance the load
III. MANCAFChat Application
The MANCAFChat application was designed to provide a basic chat facility to users. The application
was implemented to provide Chat utility by utilizing the PAN s of mobile devices. The mobile devices are so
common now days so that every people carry it with them. Currently we have developed this application using
J2ME and MANCAF framework.
Figure 3 shows the architecture of MANCAFChat application which is based on Model-View-
Controller (MVC) pattern. The MVC pattern provides the flexibility to revise the user interface design without
changing the logic of application.
The core part of the architecture is Controller package, where MANCAFChat class is the prime
controller of the application which is responsible to handle the events and action. Some of the methods are
shown in Figure 3. The View package contains classes represents the all the GUI components used in the
development of mobile application. These classes inherit the GUI of programming language. Currently the
MANCAFChat is implemented using J2ME so the classes will extend the GUI classes of J2ME.
Figure 3 MANCAFChat Architecture
The classes which contain the logic of the application are in Model package. In Model package,
participant class manages the information about the nodes which are found nearby. The Network package
manages the communication between the mobile devices. It includes establishment of connection, management
of new and gone devices, routing of messaging, session management and real data transfer.
The Util package provides the support to other classes in different packages. The Util class has number
of static methods which other class can access. Event class help the MVC architecture to handle all the events
generated in application and transfer the event information to handleevent method of MANCAFChat class.
Before exchanging the data between nodes, data has to be serialized with help of methods provided by Serialize
class.
Figure 4 illustrate the different steps to send or receive the message in MANAFChat application. At the
beginning of application display setting page where user can set interface name. After that user have two menu
choice named: Search and View Log. The View log display the previous data of chat messages. The log
functionality given in application is for testing purpose only. It is very helpful to ensure that application is
executing as per sequence. The Search selection starts the searching of devices in MANET. If no devices are
found then application user can again initiate the search process. The participant is shown to user and one or
MANCAFChat - An Application to Evaluate MANCAF Framework
DOI: 10.9790/0661-1764102107 www.iosrjournals.org 105 | Page
more participant is selected to start the chat process. Here only devices which run the MANCAFChat service are
listed. After this mobile devices of selected participant swap the information.
Figure 4 MANCAFChatt Application Flow
IV. Evaluation
This section describes the evaluation of MANCAFChat application through usability-test. It also
describes the evaluation of MANCAF framework by stating those requirements defined in framework are
satisfied or not.
In usability-test, we had observed and interviewed ten users. The test was carried out to identify the
usefulness of the application and identify the crucial problems in real usage of such collaborative application in
real world. The session was started with the introduction of application and working of it. Then that ten people
were asked to send the messages in some small group. After that we give them set of question which they need
to fill the answer. Following are the summary of results.
1. Is application useful?
Observe Comment: 70% of people said that application is useful and they might use the application.
They also pointed the issues like discovering of nodes takes too much time which needs to reduce.
2. Are there any avoidable features?
Observe Comment: 90% of people pointed out the common problem which is Bluetooth security
prompts. Except this, others feature are good. This makes application simple to use.
3. Are there any features required?
Observe Comment: 90% of people pointed that it would be good if we add exchanging of file between
the users.
MANCAFChat - An Application to Evaluate MANCAF Framework
DOI: 10.9790/0661-1764102107 www.iosrjournals.org 106 | Page
4. What kind of improvement needed?
Observe Comment: All the people were mentions that make it likely to automate the procedure of getting
purge on Bluetooth security message.
Table -2 shows the result of MANCAF framework evaluation.
Table 2
ID Requirement description Fulfilled
R1 The framework must be able to support mobile devices Yes
R2 The framework must work with different network mediums Partial (Currently Bluetooth)
R3 The derived application must not be dependent on what network medium is
used by framework.
Yes
R4 The framework must be able to create a network without any central device Yes
R5 The framework must be able to create a group of more than one devices Yes
R6 The framework must be able to transfer the data to different connected
devices
Yes
R7 The framework allows the application to form a new group or join existing
group
Yes
R8 The framework must provide searching facility to find the existing group Yes
R9 The framework able to query the application for any arriving or leaving
connection
Yes
R10 The framework must notify about new device joining notification to every
connected devices.
Yes
R11 The framework must be able to maximum the number of devices in a group No (Implemented by Application)
R12 The framework must be able to identify the source which originate the
transfer
Yes
R13 The framework must be able to send the same data to multiple devices Yes
R14 The framework must allow the continuous searching of group No
R15 The framework must support different resource management technique to
balance the load
No
V. Related Work
This section describes the other frameworks for the development of mobile applications.
JXTA [7] is open-source framework with set of protocols and API to develop application. It is for
computer-to-computer communication and independent of network platform. JXME is JXTA for J2ME which is
light-weight implementation of JXTA for mobile devices. It provides the full functionality of JXTA through
relay host.
Proem [9] is framework with an objective to provide a framework to develop collaborative application
which runs in ad-hoc network. It is implemented on Java and runs of PDAs and other wireless devices. Proem
design is independent from network protocols. It can be executed over TCP/IP and HTTP. J2ME version of
Proem has not been succeeded.
Mobile Chedar[10] is middleware allowing mobile devices to access central chedar network and
exchange the information with each other. The purpose of Chedar is to provide flexible API to application
developer for developing collaborative application. It is implemented using J2ME and Bluetooth is used for
communication. But the communication is based on Mobile Chedar gateway device which runs on PC. This
approach has a problem of single point of failure.
The JMobiPeer[11] provides support to discover and group management. It offers interoperability with
JXTA. Its execution is based on J2ME. The real implementation of it has tested only on simulators on standard
computers.
VI. Conclusion
In this paper we have describe the application for mobile devices to support collaboration. The
application utilizes the MANET to perform the collaborative task. In this case, we developed an application to
exchange the messages among the different users. The main question: Is it useful to use collaborative
application running on mobile devices in MANET to exchange the messages? To find the answer of this
question, we used usability-test. We provided the application to group of people and told them use the
application without any kind of help. The idea behind the MANCAFChat application was to provide multiuser
chat application without too much user interaction. The application is very useful if problem with Bluetooth
security prompt is solved.
References
[1] Baecker, R., “Readings in Groupware and Computer Supported Cooperative Work”, Morgan Kaufmann, San Mateo CA, ISBN 1-
55860-241-0, 1993
[2] Duchamp, D., "Issues in Wireless Mobile Computing”, Proc. Third Workshop on Workstation Operating Systems, Key Biscayne,
Florida, U.S.A., pp 2-10, 1992
[3] Brinck, Tom's CSCW and Groupware Page http://www.infres.enst.fr/~vercken/multicast/cscw.html
MANCAFChat - An Application to Evaluate MANCAF Framework
DOI: 10.9790/0661-1764102107 www.iosrjournals.org 107 | Page
[4] Miller , B. A. and Bisdikian, C. (2004), Bluetooth Revealed, Addison-Wesley, 2 edition
[5] A. I. Wang, M. S. Norum, and C.-H. W. Lund. Issues related to Development of Wireless Peer-to-Peer Games in J2ME. In First
Conference on Entertainment Systems (ENSYS 2006), page 6, Guadeloupe, French Caribbean, February 23-25 2006.
[6] Gerd Kortuem, Jay Schneider, Dustin Preuitt Thaddeus, G. C. Thompson, Stephen Fickas and Zary
Segall. When Peer-to-Peer comes Face-to-Face: Collaborative Peer-to-Peer Computing in Mobile Ah-hoc Networks. In First
International conference on Peer-to-Peer Computing, Linkoping, Sweeden, 27-29 August 2001.
[7] Nico Maibaum and Thomas Mundt. JXTA: A Technology facilitating Mobile Peer-to-Peer Networks. In International Mobility and
Wireless Access Workshop (MobiWac’02), pages 7-13, Fort Worth, Texas, USA, 12 October 2012
[8] Hardik S. Mehta, Dr. Dhaval R. Kathiriya, “MANCAF: A framework for Building Collaborative Applications in Mobile Ad Hoc
Networks”, In IJCSIT, Vol 6 Issue 1, Pages 232-237, January 2015.
[9] G. Kortuem. A methodology and software platform for building wearable communities. PhD thesis, University of Oregon,
December 2002
[10] N. Kotilainen, M. Weber, M. Vapa, and J. Vuori. Mobile Chedar A Peer-to-Peer Middleware for Mobile Devices. In Third IEEE
International Conference on Pervasive Computing and Communications Workshops (PERCOMW’05), pages 86–90, 2005.
[11] Mario Bisiganao, Giuseppe Di Modica and Orazio Tomarchio. JMobiPeer: A middleware for Mobile Peer-to-Peer Computing in
MANETs. In First International Workshop on Mobility in Peer-to-Peer System (MPPS) (ICDCSW’05), pages 785-791, 2005.

More Related Content

Viewers also liked

Cheap prom dresses affordable prom gowns gudeer.com
Cheap prom dresses   affordable prom gowns   gudeer.comCheap prom dresses   affordable prom gowns   gudeer.com
Cheap prom dresses affordable prom gowns gudeer.comGudeer Kitty
 
“Designed and Simulation Modified H Shaped” Microstrip Patch Antenna
“Designed and Simulation Modified H Shaped” Microstrip Patch Antenna“Designed and Simulation Modified H Shaped” Microstrip Patch Antenna
“Designed and Simulation Modified H Shaped” Microstrip Patch AntennaIOSR Journals
 
Spatial and Temporal Variation of Rainfall in IRAQ
Spatial and Temporal Variation of Rainfall in IRAQSpatial and Temporal Variation of Rainfall in IRAQ
Spatial and Temporal Variation of Rainfall in IRAQIOSR Journals
 
Lattice Parameters and Debye Temperature of Naclx Nabry-X Kcl1-Y Ternary Mixe...
Lattice Parameters and Debye Temperature of Naclx Nabry-X Kcl1-Y Ternary Mixe...Lattice Parameters and Debye Temperature of Naclx Nabry-X Kcl1-Y Ternary Mixe...
Lattice Parameters and Debye Temperature of Naclx Nabry-X Kcl1-Y Ternary Mixe...IOSR Journals
 
Study of highly broadening Photonic band gaps extension in one-dimensional Me...
Study of highly broadening Photonic band gaps extension in one-dimensional Me...Study of highly broadening Photonic band gaps extension in one-dimensional Me...
Study of highly broadening Photonic band gaps extension in one-dimensional Me...IOSR Journals
 
Parametric Sensitivity Analysis of a Mathematical Model of Two Interacting Po...
Parametric Sensitivity Analysis of a Mathematical Model of Two Interacting Po...Parametric Sensitivity Analysis of a Mathematical Model of Two Interacting Po...
Parametric Sensitivity Analysis of a Mathematical Model of Two Interacting Po...IOSR Journals
 
A Retrospective Study to Investigate Association among Age, BMI and BMD in th...
A Retrospective Study to Investigate Association among Age, BMI and BMD in th...A Retrospective Study to Investigate Association among Age, BMI and BMD in th...
A Retrospective Study to Investigate Association among Age, BMI and BMD in th...IOSR Journals
 
Design, Electrostatic and Eigen Frequency Analysis of Fixed– Fixed Beam MEMS ...
Design, Electrostatic and Eigen Frequency Analysis of Fixed– Fixed Beam MEMS ...Design, Electrostatic and Eigen Frequency Analysis of Fixed– Fixed Beam MEMS ...
Design, Electrostatic and Eigen Frequency Analysis of Fixed– Fixed Beam MEMS ...IOSR Journals
 
Energy Efficient E-BMA Protocol for Wireless Sensor Networks
Energy Efficient E-BMA Protocol for Wireless Sensor NetworksEnergy Efficient E-BMA Protocol for Wireless Sensor Networks
Energy Efficient E-BMA Protocol for Wireless Sensor NetworksIOSR Journals
 
Performance Improvement of IEEE 802.22 WRAN Physical Layer
Performance Improvement of IEEE 802.22 WRAN Physical LayerPerformance Improvement of IEEE 802.22 WRAN Physical Layer
Performance Improvement of IEEE 802.22 WRAN Physical LayerIOSR Journals
 
Buyer-Vendor Integrated system – the Technique of EOQ Dependent Shipment Size...
Buyer-Vendor Integrated system – the Technique of EOQ Dependent Shipment Size...Buyer-Vendor Integrated system – the Technique of EOQ Dependent Shipment Size...
Buyer-Vendor Integrated system – the Technique of EOQ Dependent Shipment Size...IOSR Journals
 
trung tâm mua đồng hồ casio chất lượng cao
trung tâm mua đồng hồ casio chất lượng caotrung tâm mua đồng hồ casio chất lượng cao
trung tâm mua đồng hồ casio chất lượng caoismael497
 
GC-S006-Graphing
GC-S006-GraphingGC-S006-Graphing
GC-S006-Graphinghenry kang
 
PI PRODUK HEWAN OLAHAN
PI PRODUK HEWAN OLAHANPI PRODUK HEWAN OLAHAN
PI PRODUK HEWAN OLAHANlegalservice
 

Viewers also liked (20)

D013152126
D013152126D013152126
D013152126
 
NPIK GULA
NPIK GULANPIK GULA
NPIK GULA
 
Cheap prom dresses affordable prom gowns gudeer.com
Cheap prom dresses   affordable prom gowns   gudeer.comCheap prom dresses   affordable prom gowns   gudeer.com
Cheap prom dresses affordable prom gowns gudeer.com
 
M0174491101
M0174491101M0174491101
M0174491101
 
“Designed and Simulation Modified H Shaped” Microstrip Patch Antenna
“Designed and Simulation Modified H Shaped” Microstrip Patch Antenna“Designed and Simulation Modified H Shaped” Microstrip Patch Antenna
“Designed and Simulation Modified H Shaped” Microstrip Patch Antenna
 
Spatial and Temporal Variation of Rainfall in IRAQ
Spatial and Temporal Variation of Rainfall in IRAQSpatial and Temporal Variation of Rainfall in IRAQ
Spatial and Temporal Variation of Rainfall in IRAQ
 
Lattice Parameters and Debye Temperature of Naclx Nabry-X Kcl1-Y Ternary Mixe...
Lattice Parameters and Debye Temperature of Naclx Nabry-X Kcl1-Y Ternary Mixe...Lattice Parameters and Debye Temperature of Naclx Nabry-X Kcl1-Y Ternary Mixe...
Lattice Parameters and Debye Temperature of Naclx Nabry-X Kcl1-Y Ternary Mixe...
 
Study of highly broadening Photonic band gaps extension in one-dimensional Me...
Study of highly broadening Photonic band gaps extension in one-dimensional Me...Study of highly broadening Photonic band gaps extension in one-dimensional Me...
Study of highly broadening Photonic band gaps extension in one-dimensional Me...
 
Parametric Sensitivity Analysis of a Mathematical Model of Two Interacting Po...
Parametric Sensitivity Analysis of a Mathematical Model of Two Interacting Po...Parametric Sensitivity Analysis of a Mathematical Model of Two Interacting Po...
Parametric Sensitivity Analysis of a Mathematical Model of Two Interacting Po...
 
A Retrospective Study to Investigate Association among Age, BMI and BMD in th...
A Retrospective Study to Investigate Association among Age, BMI and BMD in th...A Retrospective Study to Investigate Association among Age, BMI and BMD in th...
A Retrospective Study to Investigate Association among Age, BMI and BMD in th...
 
Design, Electrostatic and Eigen Frequency Analysis of Fixed– Fixed Beam MEMS ...
Design, Electrostatic and Eigen Frequency Analysis of Fixed– Fixed Beam MEMS ...Design, Electrostatic and Eigen Frequency Analysis of Fixed– Fixed Beam MEMS ...
Design, Electrostatic and Eigen Frequency Analysis of Fixed– Fixed Beam MEMS ...
 
E010523539
E010523539E010523539
E010523539
 
Energy Efficient E-BMA Protocol for Wireless Sensor Networks
Energy Efficient E-BMA Protocol for Wireless Sensor NetworksEnergy Efficient E-BMA Protocol for Wireless Sensor Networks
Energy Efficient E-BMA Protocol for Wireless Sensor Networks
 
F012644451
F012644451F012644451
F012644451
 
Performance Improvement of IEEE 802.22 WRAN Physical Layer
Performance Improvement of IEEE 802.22 WRAN Physical LayerPerformance Improvement of IEEE 802.22 WRAN Physical Layer
Performance Improvement of IEEE 802.22 WRAN Physical Layer
 
D013142435
D013142435D013142435
D013142435
 
Buyer-Vendor Integrated system – the Technique of EOQ Dependent Shipment Size...
Buyer-Vendor Integrated system – the Technique of EOQ Dependent Shipment Size...Buyer-Vendor Integrated system – the Technique of EOQ Dependent Shipment Size...
Buyer-Vendor Integrated system – the Technique of EOQ Dependent Shipment Size...
 
trung tâm mua đồng hồ casio chất lượng cao
trung tâm mua đồng hồ casio chất lượng caotrung tâm mua đồng hồ casio chất lượng cao
trung tâm mua đồng hồ casio chất lượng cao
 
GC-S006-Graphing
GC-S006-GraphingGC-S006-Graphing
GC-S006-Graphing
 
PI PRODUK HEWAN OLAHAN
PI PRODUK HEWAN OLAHANPI PRODUK HEWAN OLAHAN
PI PRODUK HEWAN OLAHAN
 

Similar to L01764102107

An approach of software engineering through middleware
An approach of software engineering through middlewareAn approach of software engineering through middleware
An approach of software engineering through middlewareIAEME Publication
 
Geochronos File Sharing Application Using Cloud
Geochronos File Sharing Application Using CloudGeochronos File Sharing Application Using Cloud
Geochronos File Sharing Application Using CloudIJERA Editor
 
CONTROLLING INFORMATION FLOWS DURING SOFTWARE DEVELOPMENT
CONTROLLING INFORMATION FLOWS DURING SOFTWARE DEVELOPMENT CONTROLLING INFORMATION FLOWS DURING SOFTWARE DEVELOPMENT
CONTROLLING INFORMATION FLOWS DURING SOFTWARE DEVELOPMENT ijsptm
 
RCAMM_IEEE_RAICS_2013_6745453
RCAMM_IEEE_RAICS_2013_6745453RCAMM_IEEE_RAICS_2013_6745453
RCAMM_IEEE_RAICS_2013_6745453Shekhar Parkhi
 
Surname 1I attached the book for this class as a pdf as well. .docx
Surname 1I attached the book for this class as a pdf as well. .docxSurname 1I attached the book for this class as a pdf as well. .docx
Surname 1I attached the book for this class as a pdf as well. .docxmattinsonjanel
 
Middleware Implementation in Cloud-MANET Mobility Model for Internet of Smart...
Middleware Implementation in Cloud-MANET Mobility Model for Internet of Smart...Middleware Implementation in Cloud-MANET Mobility Model for Internet of Smart...
Middleware Implementation in Cloud-MANET Mobility Model for Internet of Smart...AlAtfat
 
An Effective Online Food Order Application System using Asp .Net Core 3.1 Fra...
An Effective Online Food Order Application System using Asp .Net Core 3.1 Fra...An Effective Online Food Order Application System using Asp .Net Core 3.1 Fra...
An Effective Online Food Order Application System using Asp .Net Core 3.1 Fra...ijtsrd
 
DESIGN PATTERNS IN THE WORKFLOW IMPLEMENTATION OF MARINE RESEARCH GENERAL INF...
DESIGN PATTERNS IN THE WORKFLOW IMPLEMENTATION OF MARINE RESEARCH GENERAL INF...DESIGN PATTERNS IN THE WORKFLOW IMPLEMENTATION OF MARINE RESEARCH GENERAL INF...
DESIGN PATTERNS IN THE WORKFLOW IMPLEMENTATION OF MARINE RESEARCH GENERAL INF...AM Publications
 
Implementation and Evaluation of a Component-Based framework for Internet App...
Implementation and Evaluation of a Component-Based framework for Internet App...Implementation and Evaluation of a Component-Based framework for Internet App...
Implementation and Evaluation of a Component-Based framework for Internet App...ITIIIndustries
 
A Survey of Past, Present and Future of Software Defined Networking.pdf
A Survey of Past, Present and Future of Software Defined Networking.pdfA Survey of Past, Present and Future of Software Defined Networking.pdf
A Survey of Past, Present and Future of Software Defined Networking.pdfWendy Belieu
 
Ijarcet vol-2-issue-7-2297-2301
Ijarcet vol-2-issue-7-2297-2301Ijarcet vol-2-issue-7-2297-2301
Ijarcet vol-2-issue-7-2297-2301Editor IJARCET
 
Ijarcet vol-2-issue-7-2297-2301
Ijarcet vol-2-issue-7-2297-2301Ijarcet vol-2-issue-7-2297-2301
Ijarcet vol-2-issue-7-2297-2301Editor IJARCET
 
Android Based Smart Department
Android Based Smart DepartmentAndroid Based Smart Department
Android Based Smart DepartmentIRJET Journal
 
An Event-based Middleware for Syntactical Interoperability in Internet of Th...
An Event-based Middleware for Syntactical Interoperability  in Internet of Th...An Event-based Middleware for Syntactical Interoperability  in Internet of Th...
An Event-based Middleware for Syntactical Interoperability in Internet of Th...IJECEIAES
 
Automatized Application Services for Android Devices Using Apache Ant in Clou...
Automatized Application Services for Android Devices Using Apache Ant in Clou...Automatized Application Services for Android Devices Using Apache Ant in Clou...
Automatized Application Services for Android Devices Using Apache Ant in Clou...IRJET Journal
 
Real-Time WebRTC based Mobile Surveillance System
Real-Time WebRTC based Mobile Surveillance SystemReal-Time WebRTC based Mobile Surveillance System
Real-Time WebRTC based Mobile Surveillance SystemDr. Amarjeet Singh
 

Similar to L01764102107 (20)

An approach of software engineering through middleware
An approach of software engineering through middlewareAn approach of software engineering through middleware
An approach of software engineering through middleware
 
A210105
A210105A210105
A210105
 
Geochronos File Sharing Application Using Cloud
Geochronos File Sharing Application Using CloudGeochronos File Sharing Application Using Cloud
Geochronos File Sharing Application Using Cloud
 
CONTROLLING INFORMATION FLOWS DURING SOFTWARE DEVELOPMENT
CONTROLLING INFORMATION FLOWS DURING SOFTWARE DEVELOPMENT CONTROLLING INFORMATION FLOWS DURING SOFTWARE DEVELOPMENT
CONTROLLING INFORMATION FLOWS DURING SOFTWARE DEVELOPMENT
 
RCAMM_IEEE_RAICS_2013_6745453
RCAMM_IEEE_RAICS_2013_6745453RCAMM_IEEE_RAICS_2013_6745453
RCAMM_IEEE_RAICS_2013_6745453
 
Surname 1I attached the book for this class as a pdf as well. .docx
Surname 1I attached the book for this class as a pdf as well. .docxSurname 1I attached the book for this class as a pdf as well. .docx
Surname 1I attached the book for this class as a pdf as well. .docx
 
Middleware Implementation in Cloud-MANET Mobility Model for Internet of Smart...
Middleware Implementation in Cloud-MANET Mobility Model for Internet of Smart...Middleware Implementation in Cloud-MANET Mobility Model for Internet of Smart...
Middleware Implementation in Cloud-MANET Mobility Model for Internet of Smart...
 
An Effective Online Food Order Application System using Asp .Net Core 3.1 Fra...
An Effective Online Food Order Application System using Asp .Net Core 3.1 Fra...An Effective Online Food Order Application System using Asp .Net Core 3.1 Fra...
An Effective Online Food Order Application System using Asp .Net Core 3.1 Fra...
 
DESIGN PATTERNS IN THE WORKFLOW IMPLEMENTATION OF MARINE RESEARCH GENERAL INF...
DESIGN PATTERNS IN THE WORKFLOW IMPLEMENTATION OF MARINE RESEARCH GENERAL INF...DESIGN PATTERNS IN THE WORKFLOW IMPLEMENTATION OF MARINE RESEARCH GENERAL INF...
DESIGN PATTERNS IN THE WORKFLOW IMPLEMENTATION OF MARINE RESEARCH GENERAL INF...
 
Crime security.
Crime security.Crime security.
Crime security.
 
I44084954
I44084954I44084954
I44084954
 
Implementation and Evaluation of a Component-Based framework for Internet App...
Implementation and Evaluation of a Component-Based framework for Internet App...Implementation and Evaluation of a Component-Based framework for Internet App...
Implementation and Evaluation of a Component-Based framework for Internet App...
 
A Survey of Past, Present and Future of Software Defined Networking.pdf
A Survey of Past, Present and Future of Software Defined Networking.pdfA Survey of Past, Present and Future of Software Defined Networking.pdf
A Survey of Past, Present and Future of Software Defined Networking.pdf
 
Ijarcet vol-2-issue-7-2297-2301
Ijarcet vol-2-issue-7-2297-2301Ijarcet vol-2-issue-7-2297-2301
Ijarcet vol-2-issue-7-2297-2301
 
Ijarcet vol-2-issue-7-2297-2301
Ijarcet vol-2-issue-7-2297-2301Ijarcet vol-2-issue-7-2297-2301
Ijarcet vol-2-issue-7-2297-2301
 
Android Based Smart Department
Android Based Smart DepartmentAndroid Based Smart Department
Android Based Smart Department
 
An Event-based Middleware for Syntactical Interoperability in Internet of Th...
An Event-based Middleware for Syntactical Interoperability  in Internet of Th...An Event-based Middleware for Syntactical Interoperability  in Internet of Th...
An Event-based Middleware for Syntactical Interoperability in Internet of Th...
 
Index
IndexIndex
Index
 
Automatized Application Services for Android Devices Using Apache Ant in Clou...
Automatized Application Services for Android Devices Using Apache Ant in Clou...Automatized Application Services for Android Devices Using Apache Ant in Clou...
Automatized Application Services for Android Devices Using Apache Ant in Clou...
 
Real-Time WebRTC based Mobile Surveillance System
Real-Time WebRTC based Mobile Surveillance SystemReal-Time WebRTC based Mobile Surveillance System
Real-Time WebRTC based Mobile Surveillance System
 

More from IOSR Journals (20)

A011140104
A011140104A011140104
A011140104
 
M0111397100
M0111397100M0111397100
M0111397100
 
L011138596
L011138596L011138596
L011138596
 
K011138084
K011138084K011138084
K011138084
 
J011137479
J011137479J011137479
J011137479
 
I011136673
I011136673I011136673
I011136673
 
G011134454
G011134454G011134454
G011134454
 
H011135565
H011135565H011135565
H011135565
 
F011134043
F011134043F011134043
F011134043
 
E011133639
E011133639E011133639
E011133639
 
D011132635
D011132635D011132635
D011132635
 
C011131925
C011131925C011131925
C011131925
 
B011130918
B011130918B011130918
B011130918
 
A011130108
A011130108A011130108
A011130108
 
I011125160
I011125160I011125160
I011125160
 
H011124050
H011124050H011124050
H011124050
 
G011123539
G011123539G011123539
G011123539
 
F011123134
F011123134F011123134
F011123134
 
E011122530
E011122530E011122530
E011122530
 
D011121524
D011121524D011121524
D011121524
 

Recently uploaded

Top 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTop 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTopCSSGallery
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentationyogeshlabana357357
 
Microsoft BitLocker Bypass Attack Method.pdf
Microsoft BitLocker Bypass Attack Method.pdfMicrosoft BitLocker Bypass Attack Method.pdf
Microsoft BitLocker Bypass Attack Method.pdfOverkill Security
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxFIDO Alliance
 
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)Paige Cruz
 
CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)Wonjun Hwang
 
Simplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxSimplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxMarkSteadman7
 
Navigating the Large Language Model choices_Ravi Daparthi
Navigating the Large Language Model choices_Ravi DaparthiNavigating the Large Language Model choices_Ravi Daparthi
Navigating the Large Language Model choices_Ravi DaparthiRaviKumarDaparthi
 
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?Paolo Missier
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe中 央社
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAnitaRaj43
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)Samir Dash
 
The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...
The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...
The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...SOFTTECHHUB
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptxFIDO Alliance
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxFIDO Alliance
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxFIDO Alliance
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxFIDO Alliance
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfSrushith Repakula
 
Vector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxVector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxjbellis
 

Recently uploaded (20)

Top 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTop 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development Companies
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentation
 
Microsoft BitLocker Bypass Attack Method.pdf
Microsoft BitLocker Bypass Attack Method.pdfMicrosoft BitLocker Bypass Attack Method.pdf
Microsoft BitLocker Bypass Attack Method.pdf
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptx
 
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
 
CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)
 
Simplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxSimplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptx
 
Navigating the Large Language Model choices_Ravi Daparthi
Navigating the Large Language Model choices_Ravi DaparthiNavigating the Large Language Model choices_Ravi Daparthi
Navigating the Large Language Model choices_Ravi Daparthi
 
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 
The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...
The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...
The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptx
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptx
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptx
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 
Vector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxVector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptx
 

L01764102107

  • 1. IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 6, Ver. IV (Nov – Dec. 2015), PP 102-107 www.iosrjournals.org DOI: 10.9790/0661-1764102107 www.iosrjournals.org 102 | Page MANCAFChat - An Application to Evaluate MANCAF Framework Mr. Hardik S. Mehta1 , Dr. Dhaval R. Kathiriya2 1 (Research Scholar, School of Computer Science, RK University, Rajkot) 2 (Director IT, Anand Agriculture University, Anand) Abstract: The collaborative application uses the MANET to exchange the information between the available nodes. The development of such kind of application takes too much time to implement the network communication services. This paper describes the implementation of MANCAF framework by developing collaborative application named MANCAFChat. It was designed based on the MANCAF framework. The main purpose behind the design of such application is to evaluate the effectiveness of MANCAF framework and usefulness of collaborative application. Keywords: Collaborative Application, MANCAF Framework, MANET I. Introduction For last few decades, commercial and personal community were interested in the Computer Supported Cooperative Work (CSCW) [1] area and in mobile computing [2]. CSCW engages the study of how persons work together using network technology, and related software, hardware, techniques and services [3]. Wireless devices support different PAN technologies which includes IrDA, Bluetooth [4]. This technology can be used to transfer the data between mobile devices. It can be visualized as a digital sphere near the mobile device which support a collaborative network for users in a range. A MANET can be utilized to exchange the data between people with mobile devices. In MANET, devices can connect to and disconnect from the network dynamically making the topology unstable and random. Mobile devices in MANET can communicate with each other by initiating direct request by user, automatically by mobile device or hybrid of this two [5]. The new development in wireless technologies, mobile phones and programming languages for mobile phones have made possible to transfer the wired computing to a wireless network [6], [7]. The P2P architecture patterns fits very well to execute collaborative applications with nodes of network represent the users and the network between nodes represents the collaborative links among users. MANETs with the use of IrDA, Bluetooth and Wi-Fi allow a new kind of collaborative application to users that are actually collocated. In [8], we proposed MANCAF framework to support collaborative application development for mobile device in short span of time. Main idea behind the framework is to present an advanced programming framework to developers so that they only need to use simple methods to manage the different task of MANET. The rest of the paper is ordered as follows. Section 2 describes the MANCAF framework on which MANCAFChat application built. Section 3 describes the architectural design of MANCAFChat application. Section 4 describes the evaluation of MANCAFChat application and MANCAF framework. Section 5 describes the related framework. Finally, Section 6 concludes the paper. II. MANCAF Framework The design of MANCAF is based on layered architecture to provide features like modularity and simplicity. Each layer is assigned a specific responsibility and it is based on the below layer. The drawback of this approach could be slower execution of application if it contains many layers to perform operation. MANCAF framework can be used in mobile devices which have limited resources so we limit the number of layers used in the architecture. Fig 1 shows the compact design of framework and Fig 2 shows the high-level design of framework.
  • 2. MANCAFChat - An Application to Evaluate MANCAF Framework DOI: 10.9790/0661-1764102107 www.iosrjournals.org 103 | Page Figure 1 Compact Design The MANCAF architecture contains the following part: Device: It represents the mobile devices which run the application develop using framework. Two or more devices create ad-hoc network. Group: It is logical collection of devices within communication range and aware of each other’s existence. All devices can communicate with each other in a group. Service: It is a unique ID for the device application running the MANCAF framework. The application which runs the same service can able to communicate with each other. Network: It represents the communication medium used in the framework to communicate with neighbor devices. Message: It is an entity which represents the different kinds of data transfer between devices. It can be sent to single device or a group of devices. It can contain text, objects or binary data like images, video or audio. Session: It represent the duration of all communications between devices in a group. It maintains information about devices, group and communication medium. Framework: It is core entity between application and system. It provide interface to developer and hides the complexity. Application: It is application developed on some platform using MANCAF framework. It controls the framework. Figure 2 High Level Design Table 1 shows the important list of requirements which framework needs to fulfil in order to design collaborative application. These requirements are identified by the analysis of scenario [8]. Table 1 ID Requirement description R1 The framework must be able to support mobile devices R2 The framework must work with different network mediums R3 The derived application must not be dependent on what network medium is used by framework. R4 The framework must be able to create a network without any central device R5 The framework must be able to create a group of more than one devices R6 The framework must be able to transfer the data to different connected devices R7 The framework allows the application to form a new group or join existing group R8 The framework must provide searching facility to find the existing group R9 The framework able to query the application for any arriving or leaving connection R10 The framework must notify about new device joining notification to every connected devices. R11 The framework must be able to maximum the number of devices in a group
  • 3. MANCAFChat - An Application to Evaluate MANCAF Framework DOI: 10.9790/0661-1764102107 www.iosrjournals.org 104 | Page R12 The framework must be able to identify the source which originate the transfer R13 The framework must be able to send the same data to multiple devices R14 The framework must allow the continuous searching of group R15 The framework must support different resource management technique to balance the load III. MANCAFChat Application The MANCAFChat application was designed to provide a basic chat facility to users. The application was implemented to provide Chat utility by utilizing the PAN s of mobile devices. The mobile devices are so common now days so that every people carry it with them. Currently we have developed this application using J2ME and MANCAF framework. Figure 3 shows the architecture of MANCAFChat application which is based on Model-View- Controller (MVC) pattern. The MVC pattern provides the flexibility to revise the user interface design without changing the logic of application. The core part of the architecture is Controller package, where MANCAFChat class is the prime controller of the application which is responsible to handle the events and action. Some of the methods are shown in Figure 3. The View package contains classes represents the all the GUI components used in the development of mobile application. These classes inherit the GUI of programming language. Currently the MANCAFChat is implemented using J2ME so the classes will extend the GUI classes of J2ME. Figure 3 MANCAFChat Architecture The classes which contain the logic of the application are in Model package. In Model package, participant class manages the information about the nodes which are found nearby. The Network package manages the communication between the mobile devices. It includes establishment of connection, management of new and gone devices, routing of messaging, session management and real data transfer. The Util package provides the support to other classes in different packages. The Util class has number of static methods which other class can access. Event class help the MVC architecture to handle all the events generated in application and transfer the event information to handleevent method of MANCAFChat class. Before exchanging the data between nodes, data has to be serialized with help of methods provided by Serialize class. Figure 4 illustrate the different steps to send or receive the message in MANAFChat application. At the beginning of application display setting page where user can set interface name. After that user have two menu choice named: Search and View Log. The View log display the previous data of chat messages. The log functionality given in application is for testing purpose only. It is very helpful to ensure that application is executing as per sequence. The Search selection starts the searching of devices in MANET. If no devices are found then application user can again initiate the search process. The participant is shown to user and one or
  • 4. MANCAFChat - An Application to Evaluate MANCAF Framework DOI: 10.9790/0661-1764102107 www.iosrjournals.org 105 | Page more participant is selected to start the chat process. Here only devices which run the MANCAFChat service are listed. After this mobile devices of selected participant swap the information. Figure 4 MANCAFChatt Application Flow IV. Evaluation This section describes the evaluation of MANCAFChat application through usability-test. It also describes the evaluation of MANCAF framework by stating those requirements defined in framework are satisfied or not. In usability-test, we had observed and interviewed ten users. The test was carried out to identify the usefulness of the application and identify the crucial problems in real usage of such collaborative application in real world. The session was started with the introduction of application and working of it. Then that ten people were asked to send the messages in some small group. After that we give them set of question which they need to fill the answer. Following are the summary of results. 1. Is application useful? Observe Comment: 70% of people said that application is useful and they might use the application. They also pointed the issues like discovering of nodes takes too much time which needs to reduce. 2. Are there any avoidable features? Observe Comment: 90% of people pointed out the common problem which is Bluetooth security prompts. Except this, others feature are good. This makes application simple to use. 3. Are there any features required? Observe Comment: 90% of people pointed that it would be good if we add exchanging of file between the users.
  • 5. MANCAFChat - An Application to Evaluate MANCAF Framework DOI: 10.9790/0661-1764102107 www.iosrjournals.org 106 | Page 4. What kind of improvement needed? Observe Comment: All the people were mentions that make it likely to automate the procedure of getting purge on Bluetooth security message. Table -2 shows the result of MANCAF framework evaluation. Table 2 ID Requirement description Fulfilled R1 The framework must be able to support mobile devices Yes R2 The framework must work with different network mediums Partial (Currently Bluetooth) R3 The derived application must not be dependent on what network medium is used by framework. Yes R4 The framework must be able to create a network without any central device Yes R5 The framework must be able to create a group of more than one devices Yes R6 The framework must be able to transfer the data to different connected devices Yes R7 The framework allows the application to form a new group or join existing group Yes R8 The framework must provide searching facility to find the existing group Yes R9 The framework able to query the application for any arriving or leaving connection Yes R10 The framework must notify about new device joining notification to every connected devices. Yes R11 The framework must be able to maximum the number of devices in a group No (Implemented by Application) R12 The framework must be able to identify the source which originate the transfer Yes R13 The framework must be able to send the same data to multiple devices Yes R14 The framework must allow the continuous searching of group No R15 The framework must support different resource management technique to balance the load No V. Related Work This section describes the other frameworks for the development of mobile applications. JXTA [7] is open-source framework with set of protocols and API to develop application. It is for computer-to-computer communication and independent of network platform. JXME is JXTA for J2ME which is light-weight implementation of JXTA for mobile devices. It provides the full functionality of JXTA through relay host. Proem [9] is framework with an objective to provide a framework to develop collaborative application which runs in ad-hoc network. It is implemented on Java and runs of PDAs and other wireless devices. Proem design is independent from network protocols. It can be executed over TCP/IP and HTTP. J2ME version of Proem has not been succeeded. Mobile Chedar[10] is middleware allowing mobile devices to access central chedar network and exchange the information with each other. The purpose of Chedar is to provide flexible API to application developer for developing collaborative application. It is implemented using J2ME and Bluetooth is used for communication. But the communication is based on Mobile Chedar gateway device which runs on PC. This approach has a problem of single point of failure. The JMobiPeer[11] provides support to discover and group management. It offers interoperability with JXTA. Its execution is based on J2ME. The real implementation of it has tested only on simulators on standard computers. VI. Conclusion In this paper we have describe the application for mobile devices to support collaboration. The application utilizes the MANET to perform the collaborative task. In this case, we developed an application to exchange the messages among the different users. The main question: Is it useful to use collaborative application running on mobile devices in MANET to exchange the messages? To find the answer of this question, we used usability-test. We provided the application to group of people and told them use the application without any kind of help. The idea behind the MANCAFChat application was to provide multiuser chat application without too much user interaction. The application is very useful if problem with Bluetooth security prompt is solved. References [1] Baecker, R., “Readings in Groupware and Computer Supported Cooperative Work”, Morgan Kaufmann, San Mateo CA, ISBN 1- 55860-241-0, 1993 [2] Duchamp, D., "Issues in Wireless Mobile Computing”, Proc. Third Workshop on Workstation Operating Systems, Key Biscayne, Florida, U.S.A., pp 2-10, 1992 [3] Brinck, Tom's CSCW and Groupware Page http://www.infres.enst.fr/~vercken/multicast/cscw.html
  • 6. MANCAFChat - An Application to Evaluate MANCAF Framework DOI: 10.9790/0661-1764102107 www.iosrjournals.org 107 | Page [4] Miller , B. A. and Bisdikian, C. (2004), Bluetooth Revealed, Addison-Wesley, 2 edition [5] A. I. Wang, M. S. Norum, and C.-H. W. Lund. Issues related to Development of Wireless Peer-to-Peer Games in J2ME. In First Conference on Entertainment Systems (ENSYS 2006), page 6, Guadeloupe, French Caribbean, February 23-25 2006. [6] Gerd Kortuem, Jay Schneider, Dustin Preuitt Thaddeus, G. C. Thompson, Stephen Fickas and Zary Segall. When Peer-to-Peer comes Face-to-Face: Collaborative Peer-to-Peer Computing in Mobile Ah-hoc Networks. In First International conference on Peer-to-Peer Computing, Linkoping, Sweeden, 27-29 August 2001. [7] Nico Maibaum and Thomas Mundt. JXTA: A Technology facilitating Mobile Peer-to-Peer Networks. In International Mobility and Wireless Access Workshop (MobiWac’02), pages 7-13, Fort Worth, Texas, USA, 12 October 2012 [8] Hardik S. Mehta, Dr. Dhaval R. Kathiriya, “MANCAF: A framework for Building Collaborative Applications in Mobile Ad Hoc Networks”, In IJCSIT, Vol 6 Issue 1, Pages 232-237, January 2015. [9] G. Kortuem. A methodology and software platform for building wearable communities. PhD thesis, University of Oregon, December 2002 [10] N. Kotilainen, M. Weber, M. Vapa, and J. Vuori. Mobile Chedar A Peer-to-Peer Middleware for Mobile Devices. In Third IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOMW’05), pages 86–90, 2005. [11] Mario Bisiganao, Giuseppe Di Modica and Orazio Tomarchio. JMobiPeer: A middleware for Mobile Peer-to-Peer Computing in MANETs. In First International Workshop on Mobility in Peer-to-Peer System (MPPS) (ICDCSW’05), pages 785-791, 2005.