• Title/Summary/Keyword: Mobile computing environment

Search Result 706, Processing Time 0.029 seconds

Implementation and Analysis of Tunneling Method for Mobile Service (이동 서비스를 위한 터널링 기법의 구현과 성능분석)

  • 천정훈;정진우강현국
    • Proceedings of the IEEK Conference
    • /
    • 1998.10a
    • /
    • pp.47-50
    • /
    • 1998
  • In recent years, it is required that computing support mobile user with computer. The advantage of mobile computing is that users may access all their applications from any location, whether they are in another building or a different state. So, Internet combines with mobile computing technology to make new communication environment for supporting mobility. The research for solving the problem of mobility is actively in progress. This paper describes the implementation of tunneling method for flexible bypass between specific region. Tunneling method provide mobile service to mobile hosts. IP datagram's address tranform method is IP-within-IP encapsulation by which an IP datagram may be encapsulated within an IP datagram. The developed IP-within-IP protocol can provide not only enhanced performance because it is implemented in kernel mode, but also convenience of usage to the application developers because it gives user interface as a dynamic link library. Verification of IP packet tunneling was text file transfer program.

  • PDF

A Study on Secure Key Backup/Recovery Scheme for Device based on Mobile Trusted Module (Mobile Trusted Module 기반 단말에서의 안전한 키 백업 및 복구 방안에 대한 연구)

  • Kang, Dong-Wan;Jun, Sung-Ik;Lee, Im-Yeoung
    • The KIPS Transactions:PartC
    • /
    • v.16C no.3
    • /
    • pp.335-346
    • /
    • 2009
  • Mobile environments are evolving the main communication environment as a develops of communication technology. In mobile environments, sensitive information can be compromised on-line, so demand for security has increased. Also, mobile devices that provide various services are in danger from malware and illegal devices, phishing and sniffing etc, and the privacy. Therefore, MTM(Mobile Trusted Module) is developed and promoted by TCG(Trusted Computing Group), which is an industry standard body to enhance the security level in the mobile computing environment. MTM protects user privacy and platform integrity, because it is embedded in the platform, and it is physically secure. However, a security approach is required when secret data is migrated elsewhere, because MTM provides strong security functions. In this paper, we analyze the TCG standard and migration method for cryptographic key, then we propose a secure migration scheme for cryptographic key using key Backup/Recovery method.

An Execution Control Algorithm for Mobile Flex Transactions in Mobile Heterogeneous Multidatabase Systems (이동 이질 멀티데이타베이스 시스텐을 위한 이동 유연 트랜잭션의 실행 제어 알고리즘)

  • Gu, Gyeong-Lee;Kim, Yu-Seong
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.11
    • /
    • pp.2845-2862
    • /
    • 1999
  • As the technical advances in portable computers and wireless communication technologies, mobile computing environment has been rapidly expanded. The mobile users on mobile host can access information via wireless communication from the distributed heterogeneous multidatabase system in which pre-existing independent local information systems are integrated into one logical system to support mobile applications. Hence, mobile transaction model should include not only the features for heterogeneous multidatabase systems but also the ones for mobile computing environment. In this paper, we proposed a mobile flex transaction model which extends the flexible transaction model that previously proposed for heterogeneous multidatabase systems is extended to support the requirements of mobile heterogeneous multidatabase systems. We also presented the execution control mechanism of the mobile flex transaction model. The proposed mobile flex transaction model allows the definition of location-dependent subtransactions, the effective support of hand-over, and the flexibility of transaction executions. Hence, the proposed mobile flex transaction model can be suit to mobile heterogeneous multidatabase systems that have low power capability, low bandwidth, and high communication failure possibility.

  • PDF

Design and Implementation of Mobile Web Map Service (모바일을 위한 웹지도 서비스의 설계 및 구현)

  • Choi, Jae-Young;Chung, Yeong-Jee
    • Journal of Internet Computing and Services
    • /
    • v.6 no.5
    • /
    • pp.97-110
    • /
    • 2005
  • Recently, many WMS(Web Map Services) and POI(Point of Interest) services come to be in service on the Internet using Web GIS(Geographic Information System) as Information Technology and computer H/W are evolved faster in its speed, network bandwidth and features. The Web GIS is, however, limited and constrained on the specification of its system configuration, the service class provided and the presentation methodology of a map. As the mobile Internet becomes popular in mobile service, Web GIS service on mobile environment is strongly required and to be provided by location based WMS(Web Map Service) on a mobile client such as PDA with location information of the user. In this paper, we made an effort to design and implement a GIS computing environment by thin client for mobile web map service. For implementing the thin client GIS computing environment. we were using NGII's(National Geographic Information Institute's) DXF map, representing the map by SVG(Scalable Vector Graphics) recommended by OGC(OpenGis Consortium), and adapting standard XML web service to provide the thin client GIS service on PDA by applying the location information of the user in realtime with GPS on mobile environment.

  • PDF

A Strategy using Updatable Message for Retaining the Cache Consistency in the Mobile Computing Environment (이동 컴퓨팅 환경에서 갱신가능 메시지를 이용한 캐쉬 일과성 유지 정책)

  • Park, Seong-Bae;Hwang, Bu-Hyun
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.7
    • /
    • pp.1694-1705
    • /
    • 1997
  • In the future mobile computing environment, it will be generalized that a mobile host with portable Laptop of Palmtop accesses to database through wireless communication channel. For solving the problems which are caused from low bandwidth of wireless communication, mobile hosts cache the datum used frequently on them. Thus the mobile hosts must always retain the cache consistency for the correctness of the cached datum. the cache consistency is mainly affected from the unrestricted host mobility and the disconnection of the communication between mobile hosts and mobile support station. In this situation, the strategy to retain efficiently cache consistency is required. In this paper, we propose a strategy using updatable message for retaining the cache consistency, in the mobile computing environment, with replicated database supporting 2 phase commit protocol. This strategy makes use of a updatable message to resolve the cache consistency problem, since mobile host crosses the boundary of cell. In using of this updatable, it find out and cache only the update data of missing invalidation message. As a result, the proposed strategy utilizes network bandwidth efficiently because it is not need to delete all the cached datum with any datum change.

  • PDF

A Study of Mobile Edge Computing System Architecture for Connected Car Media Services on Highway

  • Lee, Sangyub;Lee, Jaekyu;Cho, Hyeonjoong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.12
    • /
    • pp.5669-5684
    • /
    • 2018
  • The new mobile edge network architecture has been required for an increasing amount of traffic, quality requirements, advanced driver assistance system for autonomous driving and new cloud computing demands on highway. This article proposes a hierarchical cloud computing architecture to enhance performance by using adaptive data load distribution for buses that play the role of edge computing server. A vehicular dynamic cloud is based on wireless architecture including Wireless Local Area Network and Long Term Evolution Advanced communication is used for data transmission between moving buses and cars. The main advantages of the proposed architecture include both a reduction of data loading for top layer cloud server and effective data distribution on traffic jam highway where moving vehicles require video on demand (VOD) services from server. Through the description of real environment based on NS-2 network simulation, we conducted experiments to validate the proposed new architecture. Moreover, we show the feasibility and effectiveness for the connected car media service on highway.

Design and Implementation of N-Screen Based Movie Reservation System in the jQuery Mobile Environment (제이쿼리 모바일 환경에서 N-스크린 기반의 영화 예매 시스템의 설계 및 구현)

  • Lee, Myeong-Ho
    • Journal of Digital Convergence
    • /
    • v.12 no.5
    • /
    • pp.255-261
    • /
    • 2014
  • This paper intends to suggest methods to design and implement a jQuery mobile based system in a future mobile webapp environment through a study on an N-Screen application in a mobile webapp. N-Screen is one of the representative services of cloud computing. It is promoted by the need of users to require universal functions for all devices. However, this situation is in conflict with the users' need to have the same experience and N-Screen cannot deal with these disparate services. Thus, this study intends to suggest a system analysis, structure of design, and a framework by implementing the N-Screen based movie reservation system in the jQuery mobile environment.

Design and Prototype Implementation of Museum Asset Management System Using Mobile RFID Devices (모바일 RFID 장치를 이용한 박물관 관리 시스템 설계 및 구현)

  • Kim, Young-Il;Cheong, Tae-Su
    • Proceedings of the CALSEC Conference
    • /
    • 2005.11a
    • /
    • pp.78-84
    • /
    • 2005
  • As the research activities related to 'Ubiquitous Computing' whose concept was introduced by Mark Weiser are growing, RFID(Radio Frequency Identification) technology has recently gained attention as a technology to advance the ubiquitous computing and a lot of related researches are also in progress. Research works done so far are mainly linked to the situation that the research outputs apply to meet the requirements for asset tracking and data sharing with partners over supply chain by using fixed RFID readers. However, it is essential that users have access to real-time information about the tagged objects and services whenever and wherever they want in the era of ubiquitous computing, so mobile devices-including PDA, smart phone, cellular phone, etc - which are equipped with an RFID reader can be regarded as an essential terminal for users living in ubiquitous computing environment. As far as the application with mobile devices are concerned, there are many considerations due to their limited capabilities of data processing, battery consumption and so on. In this paper, we review the generic RFID network model and introduce the revised RFID network model in consideration of incorporation with mobile devices equipped with an RFID reader. Also, we derive the requirements for software embedded within an RFID- enabled mobile terminal and then discuss essential components for implementation. Moreover, we develop the applications for asset management at museum by using mobile RFID network model.

  • PDF

Dynamic Access Control for Personalized Environment in Ubiquitous Computing

  • Kim, Yuna;Shin, IlShik;Hong, Sung Je;Kim, Jong
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.2 no.4
    • /
    • pp.233-241
    • /
    • 2007
  • In an ubiquitous environment, for controlling user access according to environment of users, a number of access control models enforcing dynamic environment of users have been proposed. However, they do not support personalized environments of each user and have a run-time overhead of searching active roles. In this paper, we propose a new model, PE-RBAC, that extends the RBAC architecture by addition of a personalized environment component as a constraint to accommodate dynamic and mobile users. In this model, a dynamic role activation is presented by using a new role-to-environment structure instead of the conventional role hierarchy, which makes it efficient to find the active roles according to a user's personalized environment.

  • PDF

Evaluation of Geo-based Image Fusion on Mobile Cloud Environment using Histogram Similarity Analysis

  • Lee, Kiwon;Kang, Sanggoo
    • Korean Journal of Remote Sensing
    • /
    • v.31 no.1
    • /
    • pp.1-9
    • /
    • 2015
  • Mobility and cloud platform have become the dominant paradigm to develop web services dealing with huge and diverse digital contents for scientific solution or engineering application. These two trends are technically combined into mobile cloud computing environment taking beneficial points from each. The intention of this study is to design and implement a mobile cloud application for remotely sensed image fusion for the further practical geo-based mobile services. In this implementation, the system architecture consists of two parts: mobile web client and cloud application server. Mobile web client is for user interface regarding image fusion application processing and image visualization and for mobile web service of data listing and browsing. Cloud application server works on OpenStack, open source cloud platform. In this part, three server instances are generated as web server instance, tiling server instance, and fusion server instance. With metadata browsing of the processing data, image fusion by Bayesian approach is performed using functions within Orfeo Toolbox (OTB), open source remote sensing library. In addition, similarity of fused images with respect to input image set is estimated by histogram distance metrics. This result can be used as the reference criterion for user parameter choice on Bayesian image fusion. It is thought that the implementation strategy for mobile cloud application based on full open sources provides good points for a mobile service supporting specific remote sensing functions, besides image fusion schemes, by user demands to expand remote sensing application fields.