SlideShare a Scribd company logo
1 of 14
G.VINOTHINI
Data synchronization in mobile computing
systems
 Data synchronization is defined as the process of
maintaining the availability of data generated from the
source and maintaining consistency between the copies
pushed from the source and local cached or ordered data at
different computing systems without discrepanciesor
conflicts among the distributed data
 A consistency copy of data is a copy which may not be
identical to the present data record at the data generating
source,but must satisfy all the required functions and
domain dependent specific rules
Types of synchronization
1. Two-way synchronization of partial or full
copies of data
 Between mobile-device and personalarea
computer
 For example, whenever the list of contacts
and personal information manager data is
modified at any of them, it is made
consistent after synchronization
2. Server-alerted synchronization
 The server alerts the client the data modification or additions
 The client synchronizes the modified or new data by pull reques
For example, alerting new e-mail and the device pulling that
3. One-way server-initiated synchronization
 Server initiates synchronization of any new modification since
communication of last modification
 Sends modified data copies to the client
 When a new email arrives at a server, it initiates the synchronization as
and when the device connects to the server and pushes the mail
4. Client initiated refresh synchronization
 The client initiates synchronization with the server for
refreshing its existing data copies
 For refreshing the configuration parameters saved at
the server for it
 Client initiated refresh synchronization─ Example
 For example, a computer or mobile device initiates
refreshing of the hoarded contacts and personal
information data either at periodic intervals or as and
when it connects
SYNCHRONIZATION
 Data disseminated and replicated at remote
stations may occur in number of ways
 Data replication may done by copying the data
from one place to another place or copying data
from one place to many other other places or
copying the data from many other places to many
other places
 For examples music files are copied into
ipods,iphones,and to several devices
 The replicated data may be full copy or a partial
copy
Synchronization software for
mobile devices
 Let us consider a pc is associated with mobile
device and this computer connected to the
internet which download applications and larger
files
 Now consider the data at the computer is modified
at some instant,the disseminated data at the
server has changed at another instant-the changes
are take place at one of the three ends at different
instants there be a need to synchronize the data at
three ends
Synchronization protocols
 By definition, mobile users are not always connected to a network and its stored
data. Users retrieve data from the network and store it on the mobile device, where
they access and manipulate the local copy of the data. Periodically, users reconnect
with the network to send any local changes back to the networked data repository.
 Users also have the opportunity to learn about updates made to the networked data
while the device was disconnected. Occasionally, they need to resolve conflicts
among the updates made to the networked data. This reconciliation operation –
where updates are exchanged and conflicts are resolved – is known as data
synchronization. Data synchronization, then, is the process of making two sets of
data look identical. For a mobile device, synchronization applies to the data that the
mobile device stores locally.
 A data synchronization protocol defines the workflow for communication during a
data synchronization session when the mobile device is connected to the network.
The protocol must support naming and identification of records, common protocol
commands to synchronize local and network data, and it can support identification
and resolution of synchronization conflicts.
Mobile devices server and
management
Mobile agent application server
 Application level logic that handles business functions involved in a particular organization (e.g. how to
handle information requests from sales personnel in the field) and its integration with backend database or
business application systems such as mainframe financial accounting systems, manufacturing systems,
inventory, ERP (Enterprise Resource Planning) and emerging CRM (Customer Resource Management)
systems
 Presentation services for the Mobile client device (handheld computers, notebook, PDA, etc) i.e. application
server takes raw data from database applications/queries and transforms the data on a specific thin client (or
a thick client like a PC) considering its presentation space characteristics and limitations. This is also called
GUI (Graphical User Interface) in some cases though some handheld are more like older text terminals than
PC. It includes breaking the messages into smaller chunks, filtering redundant information, and even
logically compressing the data , etc.
 Transaction services, in some cases - including multi-threading for heavy volumes and persistency i.e.
recovery across session failures
 Application programming level interfaces (APIs) with specialized communications protocols
 An application server may be considered as part of a multi-tier (mostly three tier) architecture. Conventional
tiers are:
 First tier - A thin client based on handheld devices or a thick client on a PC - typically a browser-based
interface in the Web context
 Middle tier consists of business applications on a set of servers - communications and business applications
 Third Tier - backend legacy data base systems and mission-critical ERP systems on a large server or
mainframe
Gateway, portals, service discovery
 Gateway is a server or daemon typically installed onto physical or virtual appliance
placed into DMZ. The Gateway's public interface is exposed to the Internet (or other
untrusted network) and accepts TCP/IP connections from mobile applications. It
operates on IPv4 and/or IPv6 networks. Incoming client connections typically use
SSL/TLS to provide security for the network communication and a mutual trust of
communicating peers. Communication protocol is typically based on HTTP
 A mobile portal is an Internet gateway that enables mobile devices to connect
remotely with an enterprise intranet or extranet, typically via a Web browser
interface. Consumer-oriented mobile portals provide access to mobile services and
content using channels such as SMS, a microbrowser such as WAP, i-mode and
voice. Consumer mobile portals aggregate content from many sources and may offer
personalized services and content to mobile users — for example, unified
messaging, news, search facilities, directories and m-commerce transactions.

Service discovery is the automatic detection of devices and services offered by
these devices on a computer network. ... Service discovery requires a common
language to allow software agents to make use of one another's services without the
need for continuous user intervention.
Device management
 MDM is typically a deployment of a combination of on-device applications and configurations, corporate
policies and certificates, and backend infrastructure, for the purpose of simplifying and enhancing the IT
management of end user devices. In modern corporate IT environments, the sheer number and diversity of
managed devices (and user behavior) has motivated MDM solutions that allow the management of devices
and users in a consistent and scalable way. The overall role of MDM is to increase device supportability,
security, and corporate functionality while maintaining some user flexibility.
 Many organizations administer devices and applications using MDM products/services. MDM primarily
deals with corporate data segregation, securing emails, securing corporate documents on devices, enforcing
corporate policies, integrating and managing mobile devices including laptops and handhelds of various
categories. MDM implementations may be either on-premises or cloud-based.
 Some of the core functions of MDM include:
 Ensuring that diverse user equipment is configured to a consistent standard / supported set of applications,
functions, or corporate policies
 Updating equipment, applications, functions, or policies in a scalable manner
 Ensuring that users use applications in a consistent and supportable manner
 Ensuring that equipment performs consistently
 Monitoring and tracking equipment (e.g. location, status, ownership, activity)
 Being able to efficiently diagnose and troubleshoot equipment remotely
Mobile file system
 A file system for mobile computing
 Information systems. Information storage systems.
Record storage systems.
 Software and its engineering. Software organization and
properties. Contextual software domains.
Operating systems. File systems management. ...
 Theory of computation. Design and analysis of
algorithms. Data structures design and analysis. Sorting
and searching.
security
 Mobile computing security can be implemented in various layers of
mobile software, operating systems, and downloadable apps. In
addition, end users can be sensitized to the dangers and educated as
to best practices, greatly increasing their devices' security.
 Updates: Hackers and defensive software are engaged in running
battles for superiority, so any delay in updating operating systems
and/or security systems leaves mobile devices particularly
vulnerable. Systems should be set to check automatically for updates,
and users should get in the habit of performing manual updates at
regular intervals.
 While it may seem like no data is safe in this technological age, users
can greatly decrease the likelihood of a security breach on their
devices by adhering to these mobile computing security guidelines.

More Related Content

What's hot

HyperText Transfer Protocol (HTTP)
HyperText Transfer Protocol (HTTP)HyperText Transfer Protocol (HTTP)
HyperText Transfer Protocol (HTTP)Gurjot Singh
 
Internetworking basics
Internetworking basicsInternetworking basics
Internetworking basicsRomeo Alonzo
 
Distributed Operating System
Distributed Operating SystemDistributed Operating System
Distributed Operating SystemSanthiNivas
 
Multiplexing in mobile computing
Multiplexing in mobile computingMultiplexing in mobile computing
Multiplexing in mobile computingZituSahu
 
Message and Stream Oriented Communication
Message and Stream Oriented CommunicationMessage and Stream Oriented Communication
Message and Stream Oriented CommunicationDilum Bandara
 
Distributed Systems
Distributed SystemsDistributed Systems
Distributed SystemsRupsee
 
Wireless transmission
Wireless transmissionWireless transmission
Wireless transmissionRajapriya82
 
Zone Routing Protocol
Zone Routing ProtocolZone Routing Protocol
Zone Routing Protocolnitss007
 
Synchronization in distributed systems
Synchronization in distributed systems Synchronization in distributed systems
Synchronization in distributed systems SHATHAN
 
Hub, switch, router, bridge & and repeater
Hub, switch, router, bridge & and repeaterHub, switch, router, bridge & and repeater
Hub, switch, router, bridge & and repeaterMaksudujjaman
 
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESSComputer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESSDr. SELVAGANESAN S
 
Unit 1 introduction to computer networks
Unit 1  introduction to computer networksUnit 1  introduction to computer networks
Unit 1 introduction to computer networkspavan kumar Thatikonda
 
Mobile Computing UNIT-6
Mobile Computing UNIT-6Mobile Computing UNIT-6
Mobile Computing UNIT-6Ramesh Babu
 

What's hot (20)

HyperText Transfer Protocol (HTTP)
HyperText Transfer Protocol (HTTP)HyperText Transfer Protocol (HTTP)
HyperText Transfer Protocol (HTTP)
 
Unit 2
Unit 2Unit 2
Unit 2
 
Mobile computing unit 5
Mobile computing  unit 5Mobile computing  unit 5
Mobile computing unit 5
 
Internetworking basics
Internetworking basicsInternetworking basics
Internetworking basics
 
Mobile Transport layer
Mobile Transport layerMobile Transport layer
Mobile Transport layer
 
Distributed Operating System
Distributed Operating SystemDistributed Operating System
Distributed Operating System
 
Multiplexing in mobile computing
Multiplexing in mobile computingMultiplexing in mobile computing
Multiplexing in mobile computing
 
Message and Stream Oriented Communication
Message and Stream Oriented CommunicationMessage and Stream Oriented Communication
Message and Stream Oriented Communication
 
Distributed Systems
Distributed SystemsDistributed Systems
Distributed Systems
 
Network software
Network softwareNetwork software
Network software
 
Wireless transmission
Wireless transmissionWireless transmission
Wireless transmission
 
Zone Routing Protocol
Zone Routing ProtocolZone Routing Protocol
Zone Routing Protocol
 
Synchronization in distributed systems
Synchronization in distributed systems Synchronization in distributed systems
Synchronization in distributed systems
 
Hub, switch, router, bridge & and repeater
Hub, switch, router, bridge & and repeaterHub, switch, router, bridge & and repeater
Hub, switch, router, bridge & and repeater
 
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESSComputer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
 
Unit 1 introduction to computer networks
Unit 1  introduction to computer networksUnit 1  introduction to computer networks
Unit 1 introduction to computer networks
 
Wireless application protocol ppt
Wireless application protocol  pptWireless application protocol  ppt
Wireless application protocol ppt
 
Sun NFS , Case study
Sun NFS , Case study Sun NFS , Case study
Sun NFS , Case study
 
Mobile Computing UNIT-6
Mobile Computing UNIT-6Mobile Computing UNIT-6
Mobile Computing UNIT-6
 
Coda file system
Coda file systemCoda file system
Coda file system
 

Similar to SYNCHRONIZATION

D sys ch-vvdp-unit-1
D sys ch-vvdp-unit-1D sys ch-vvdp-unit-1
D sys ch-vvdp-unit-1shaik subhani
 
Essential Information about Network Architecture and Design
Essential Information about Network Architecture and DesignEssential Information about Network Architecture and Design
Essential Information about Network Architecture and DesignBizeducator.com
 
A cloud enviroment for backup and data storage
A cloud enviroment for backup and data storageA cloud enviroment for backup and data storage
A cloud enviroment for backup and data storageIGEEKS TECHNOLOGIES
 
A cloud environment for backup and data storage
A cloud environment for backup and data storageA cloud environment for backup and data storage
A cloud environment for backup and data storageIGEEKS TECHNOLOGIES
 
COMP-111 | Past Paper 2020 Long Question Solution PU BS 4 Year Program
COMP-111 | Past Paper 2020 Long Question Solution PU BS 4 Year Program COMP-111 | Past Paper 2020 Long Question Solution PU BS 4 Year Program
COMP-111 | Past Paper 2020 Long Question Solution PU BS 4 Year Program haiderali8455
 
HOW-CLOUD-IMPLEMENTATION-CAN-ENSURE-MAXIMUM-ROI.pdf
HOW-CLOUD-IMPLEMENTATION-CAN-ENSURE-MAXIMUM-ROI.pdfHOW-CLOUD-IMPLEMENTATION-CAN-ENSURE-MAXIMUM-ROI.pdf
HOW-CLOUD-IMPLEMENTATION-CAN-ENSURE-MAXIMUM-ROI.pdfAgaram Technologies
 
Distributed systems
Distributed systemsDistributed systems
Distributed systemssree kanth
 
Cloud Computing - Security Benefits and Risks
Cloud Computing - Security Benefits and RisksCloud Computing - Security Benefits and Risks
Cloud Computing - Security Benefits and RisksWilliam McBorrough
 
An Internet Based Interactive Data Acquisition System
An Internet Based Interactive Data Acquisition System An Internet Based Interactive Data Acquisition System
An Internet Based Interactive Data Acquisition System Saptarshi Nag
 
Module1 Mobile Computing Architecture
Module1 Mobile Computing ArchitectureModule1 Mobile Computing Architecture
Module1 Mobile Computing Architectureraksharao
 
444963864-INTEGRATIVE-PROGRAMMING-lesson1-pptx.pptx
444963864-INTEGRATIVE-PROGRAMMING-lesson1-pptx.pptx444963864-INTEGRATIVE-PROGRAMMING-lesson1-pptx.pptx
444963864-INTEGRATIVE-PROGRAMMING-lesson1-pptx.pptxArianne47
 
Cloude computing notes for Rgpv 7th sem student
Cloude computing notes for Rgpv 7th sem studentCloude computing notes for Rgpv 7th sem student
Cloude computing notes for Rgpv 7th sem studentgdyadav
 
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...IJTET Journal
 
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...IJTET Journal
 

Similar to SYNCHRONIZATION (20)

D sys ch-vvdp-unit-1
D sys ch-vvdp-unit-1D sys ch-vvdp-unit-1
D sys ch-vvdp-unit-1
 
Essential Information about Network Architecture and Design
Essential Information about Network Architecture and DesignEssential Information about Network Architecture and Design
Essential Information about Network Architecture and Design
 
A cloud enviroment for backup and data storage
A cloud enviroment for backup and data storageA cloud enviroment for backup and data storage
A cloud enviroment for backup and data storage
 
A cloud environment for backup and data storage
A cloud environment for backup and data storageA cloud environment for backup and data storage
A cloud environment for backup and data storage
 
106248842 cc
106248842 cc106248842 cc
106248842 cc
 
COMP-111 | Past Paper 2020 Long Question Solution PU BS 4 Year Program
COMP-111 | Past Paper 2020 Long Question Solution PU BS 4 Year Program COMP-111 | Past Paper 2020 Long Question Solution PU BS 4 Year Program
COMP-111 | Past Paper 2020 Long Question Solution PU BS 4 Year Program
 
HOW-CLOUD-IMPLEMENTATION-CAN-ENSURE-MAXIMUM-ROI.pdf
HOW-CLOUD-IMPLEMENTATION-CAN-ENSURE-MAXIMUM-ROI.pdfHOW-CLOUD-IMPLEMENTATION-CAN-ENSURE-MAXIMUM-ROI.pdf
HOW-CLOUD-IMPLEMENTATION-CAN-ENSURE-MAXIMUM-ROI.pdf
 
Distributed systems
Distributed systemsDistributed systems
Distributed systems
 
PROJECT REPORT.docx
PROJECT REPORT.docxPROJECT REPORT.docx
PROJECT REPORT.docx
 
Cloud Computing - Security Benefits and Risks
Cloud Computing - Security Benefits and RisksCloud Computing - Security Benefits and Risks
Cloud Computing - Security Benefits and Risks
 
unit 4-1.pptx
unit 4-1.pptxunit 4-1.pptx
unit 4-1.pptx
 
Chapter 03 pertemuan 4- donpas- concept and management
Chapter 03  pertemuan 4- donpas- concept and managementChapter 03  pertemuan 4- donpas- concept and management
Chapter 03 pertemuan 4- donpas- concept and management
 
An Internet Based Interactive Data Acquisition System
An Internet Based Interactive Data Acquisition System An Internet Based Interactive Data Acquisition System
An Internet Based Interactive Data Acquisition System
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Module1 Mobile Computing Architecture
Module1 Mobile Computing ArchitectureModule1 Mobile Computing Architecture
Module1 Mobile Computing Architecture
 
Lecture 4
Lecture  4Lecture  4
Lecture 4
 
444963864-INTEGRATIVE-PROGRAMMING-lesson1-pptx.pptx
444963864-INTEGRATIVE-PROGRAMMING-lesson1-pptx.pptx444963864-INTEGRATIVE-PROGRAMMING-lesson1-pptx.pptx
444963864-INTEGRATIVE-PROGRAMMING-lesson1-pptx.pptx
 
Cloude computing notes for Rgpv 7th sem student
Cloude computing notes for Rgpv 7th sem studentCloude computing notes for Rgpv 7th sem student
Cloude computing notes for Rgpv 7th sem student
 
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
 
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
 

More from vinothinisureshbabu (11)

Adobe page maker
Adobe page makerAdobe page maker
Adobe page maker
 
Operating systems
Operating systems Operating systems
Operating systems
 
Sequenential circuit-dcf
Sequenential circuit-dcfSequenential circuit-dcf
Sequenential circuit-dcf
 
DCF-Combinational circuit
DCF-Combinational circuitDCF-Combinational circuit
DCF-Combinational circuit
 
DCF - K map
DCF - K mapDCF - K map
DCF - K map
 
DCF- Logic gates and circuit
DCF- Logic gates and circuitDCF- Logic gates and circuit
DCF- Logic gates and circuit
 
Digital computer fundamentals
Digital computer fundamentalsDigital computer fundamentals
Digital computer fundamentals
 
Os - device management
Os - device managementOs - device management
Os - device management
 
Introduction to ms access
Introduction to ms accessIntroduction to ms access
Introduction to ms access
 
computer organization and architecture
computer organization and architecturecomputer organization and architecture
computer organization and architecture
 
Programming in c
Programming in cProgramming in c
Programming in c
 

Recently uploaded

Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 

Recently uploaded (20)

Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 

SYNCHRONIZATION

  • 2. Data synchronization in mobile computing systems  Data synchronization is defined as the process of maintaining the availability of data generated from the source and maintaining consistency between the copies pushed from the source and local cached or ordered data at different computing systems without discrepanciesor conflicts among the distributed data  A consistency copy of data is a copy which may not be identical to the present data record at the data generating source,but must satisfy all the required functions and domain dependent specific rules
  • 3. Types of synchronization 1. Two-way synchronization of partial or full copies of data  Between mobile-device and personalarea computer  For example, whenever the list of contacts and personal information manager data is modified at any of them, it is made consistent after synchronization
  • 4. 2. Server-alerted synchronization  The server alerts the client the data modification or additions  The client synchronizes the modified or new data by pull reques For example, alerting new e-mail and the device pulling that 3. One-way server-initiated synchronization  Server initiates synchronization of any new modification since communication of last modification  Sends modified data copies to the client  When a new email arrives at a server, it initiates the synchronization as and when the device connects to the server and pushes the mail
  • 5. 4. Client initiated refresh synchronization  The client initiates synchronization with the server for refreshing its existing data copies  For refreshing the configuration parameters saved at the server for it  Client initiated refresh synchronization─ Example  For example, a computer or mobile device initiates refreshing of the hoarded contacts and personal information data either at periodic intervals or as and when it connects
  • 6. SYNCHRONIZATION  Data disseminated and replicated at remote stations may occur in number of ways  Data replication may done by copying the data from one place to another place or copying data from one place to many other other places or copying the data from many other places to many other places  For examples music files are copied into ipods,iphones,and to several devices  The replicated data may be full copy or a partial copy
  • 7. Synchronization software for mobile devices  Let us consider a pc is associated with mobile device and this computer connected to the internet which download applications and larger files  Now consider the data at the computer is modified at some instant,the disseminated data at the server has changed at another instant-the changes are take place at one of the three ends at different instants there be a need to synchronize the data at three ends
  • 8. Synchronization protocols  By definition, mobile users are not always connected to a network and its stored data. Users retrieve data from the network and store it on the mobile device, where they access and manipulate the local copy of the data. Periodically, users reconnect with the network to send any local changes back to the networked data repository.  Users also have the opportunity to learn about updates made to the networked data while the device was disconnected. Occasionally, they need to resolve conflicts among the updates made to the networked data. This reconciliation operation – where updates are exchanged and conflicts are resolved – is known as data synchronization. Data synchronization, then, is the process of making two sets of data look identical. For a mobile device, synchronization applies to the data that the mobile device stores locally.  A data synchronization protocol defines the workflow for communication during a data synchronization session when the mobile device is connected to the network. The protocol must support naming and identification of records, common protocol commands to synchronize local and network data, and it can support identification and resolution of synchronization conflicts.
  • 9. Mobile devices server and management
  • 10. Mobile agent application server  Application level logic that handles business functions involved in a particular organization (e.g. how to handle information requests from sales personnel in the field) and its integration with backend database or business application systems such as mainframe financial accounting systems, manufacturing systems, inventory, ERP (Enterprise Resource Planning) and emerging CRM (Customer Resource Management) systems  Presentation services for the Mobile client device (handheld computers, notebook, PDA, etc) i.e. application server takes raw data from database applications/queries and transforms the data on a specific thin client (or a thick client like a PC) considering its presentation space characteristics and limitations. This is also called GUI (Graphical User Interface) in some cases though some handheld are more like older text terminals than PC. It includes breaking the messages into smaller chunks, filtering redundant information, and even logically compressing the data , etc.  Transaction services, in some cases - including multi-threading for heavy volumes and persistency i.e. recovery across session failures  Application programming level interfaces (APIs) with specialized communications protocols  An application server may be considered as part of a multi-tier (mostly three tier) architecture. Conventional tiers are:  First tier - A thin client based on handheld devices or a thick client on a PC - typically a browser-based interface in the Web context  Middle tier consists of business applications on a set of servers - communications and business applications  Third Tier - backend legacy data base systems and mission-critical ERP systems on a large server or mainframe
  • 11. Gateway, portals, service discovery  Gateway is a server or daemon typically installed onto physical or virtual appliance placed into DMZ. The Gateway's public interface is exposed to the Internet (or other untrusted network) and accepts TCP/IP connections from mobile applications. It operates on IPv4 and/or IPv6 networks. Incoming client connections typically use SSL/TLS to provide security for the network communication and a mutual trust of communicating peers. Communication protocol is typically based on HTTP  A mobile portal is an Internet gateway that enables mobile devices to connect remotely with an enterprise intranet or extranet, typically via a Web browser interface. Consumer-oriented mobile portals provide access to mobile services and content using channels such as SMS, a microbrowser such as WAP, i-mode and voice. Consumer mobile portals aggregate content from many sources and may offer personalized services and content to mobile users — for example, unified messaging, news, search facilities, directories and m-commerce transactions.  Service discovery is the automatic detection of devices and services offered by these devices on a computer network. ... Service discovery requires a common language to allow software agents to make use of one another's services without the need for continuous user intervention.
  • 12. Device management  MDM is typically a deployment of a combination of on-device applications and configurations, corporate policies and certificates, and backend infrastructure, for the purpose of simplifying and enhancing the IT management of end user devices. In modern corporate IT environments, the sheer number and diversity of managed devices (and user behavior) has motivated MDM solutions that allow the management of devices and users in a consistent and scalable way. The overall role of MDM is to increase device supportability, security, and corporate functionality while maintaining some user flexibility.  Many organizations administer devices and applications using MDM products/services. MDM primarily deals with corporate data segregation, securing emails, securing corporate documents on devices, enforcing corporate policies, integrating and managing mobile devices including laptops and handhelds of various categories. MDM implementations may be either on-premises or cloud-based.  Some of the core functions of MDM include:  Ensuring that diverse user equipment is configured to a consistent standard / supported set of applications, functions, or corporate policies  Updating equipment, applications, functions, or policies in a scalable manner  Ensuring that users use applications in a consistent and supportable manner  Ensuring that equipment performs consistently  Monitoring and tracking equipment (e.g. location, status, ownership, activity)  Being able to efficiently diagnose and troubleshoot equipment remotely
  • 13. Mobile file system  A file system for mobile computing  Information systems. Information storage systems. Record storage systems.  Software and its engineering. Software organization and properties. Contextual software domains. Operating systems. File systems management. ...  Theory of computation. Design and analysis of algorithms. Data structures design and analysis. Sorting and searching.
  • 14. security  Mobile computing security can be implemented in various layers of mobile software, operating systems, and downloadable apps. In addition, end users can be sensitized to the dangers and educated as to best practices, greatly increasing their devices' security.  Updates: Hackers and defensive software are engaged in running battles for superiority, so any delay in updating operating systems and/or security systems leaves mobile devices particularly vulnerable. Systems should be set to check automatically for updates, and users should get in the habit of performing manual updates at regular intervals.  While it may seem like no data is safe in this technological age, users can greatly decrease the likelihood of a security breach on their devices by adhering to these mobile computing security guidelines.