SlideShare une entreprise Scribd logo
1  sur  6
Télécharger pour lire hors ligne
IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163
__________________________________________________________________________________________
Volume: 01 Issue: 02 | Oct-2012, Available @ http://www.ijret.org 98
THE COMMON CHALLENGES OF MOBILE INTERNET FOR UP-
COMING GENERATION
A.Siles Balasingh
1
, N.Surenth
2
1,2
Lecturer, Department of Computer science and Engineering, St.Joseph University in Tanzania, East Africa
singh_bala@yahoo.co.in, suren.zin1@gmail.com
Abstract
In this survey we concentrate on the mobile internet. Our main focus on mobile internet in two different cases of fixed connection
which is provided by the telecommunication network provider and the second one is the wireless network which is getting from
internet access point can be home network, Education campus .etc; in this case we also would like to discuss about network layer
(protocols and Transport layer protocols).
----------------------------------------------------------------------***------------------------------------------------------------------------
INTRODUCTION
There are lots of researches and modifications are going on to
make shape the internet spans across the wide range on
protocols, devices and standards to solve the existing problems
and introducing new idea. Here we attempt to categorize some
major challenges for themobile internet of upcoming
generation, let‘s enter into a brief discussion on the recent
advances and future directions. We have categorized the three-
tire perspective.
1. The application perspective, which is very important
on existing mobile applications and recent development
applications.
2. The service Software perspective, which helps to run
the applications with mobile operatingsystems.
3. The Protocols and Networks, which helps to grow the
uniformity of internet speed from low speed to high speed
in both wired to wireless network.
MOBILE APPLICATION SOFT WARES
A lot of existing and new applications in the market with
sufficient for users but after investigating of all application are
called context-ware applications, which take into account the
position of the user her interest, and the capabilities of her
mobile device. Some applications only used in common places
and common for every one like ―face-book, Twitter‖, which can
be called location-aware because the user can expose their ideas
and other can view and response their opinion
(Publically).There are some consumers are let through the shop
by a mobile device attached to the shopping cart, these
applications are built on top of WLAN/ Internet. Our team
members has investigated the most of the applications are quite
narrow and misunderstanding of the service offered.
Especially in the face-book & Twitter services the users tried to
set-up peer-to-peer [1,2]communication whereas the service
offered was more like a public blackboard
In recent approach was the integration of sensor
networks [6] into the Internet. A dominant application here
is the combination of body area networks and medical
sensors; a very interesting field in which a lot of open
questions concerning reliability, energy consumption, security
and privacy have to be addressed. In order to simplify the
development of the above Mentioned applications, new
platforms are needed. The new platforms should carry an
abstraction of the hybrid network and Non-uniform devices,
in order to assist the application Programmers to not get
swamped with all details. An issue here is to find the
‗golden rule‘ of the abstraction: it should also allow
programmers to explicitly take into account the specific
architecture of their networks, the constraints of their
environments and the requirements of their applications.
Such an engineering flexibility can be used to tune
up applications according to their special needs.
MOBILE MIDDLEWARE APPROACHES
The development of distributed applications is a tedious task
even in homogenous networks. However, in Non- uniform
networks with a wide variety of devices, the complexity
of future distributed applications may increase by
several orders of magnitude. Existing middleware
approaches such as CORBA, DCOM and Java RMI did not
manage to meet the requirements for Developing context-
aware services [4] in hybrid networks. They do not
provide the technology to efficiently integrate networks,
positioning systems, user and device profiles. That said, it
should not be surprising that middleware platforms, which
are tailored for the development of location-aware services,
have attracted a lot of attention during the recent years.
Some major issues such as adapting content to current location
of and to the preferences of the users have been
IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163
__________________________________________________________________________________________
Volume: 01 Issue: 02 | Oct-2012, Available @ http://www.ijret.org 99
investigated thoroughly. The same holds true for the adaptation
of the presentation of this content to the capabilities of the
actually used mobile device: Selection of content
according to the current location and the interests of the user.
In the approaches investigated in the selection of the content
to be displayed on the mobile device is done according to the
current position of the mobile. Here, the content is known
beforehand and a mapping between the content and a certain
position is provided by the service provider. The latter uses
information retrieval services to get content based on the
current location and user preferences, whereas the
former uses metadata to compile content that corresponds
to the user‘s current position. An advanced version of what
can be done with user profiles is presented. The Shark
approach allows information exchange between mobile
devices, Based on the personal profiles of their users.
Adapting content to the capabilities of the actually used
mobile device. Authors describe architecture that allows
protocols to adapt the presentation of given content
to the capabilities, e.g. size of the display, of the device
on which the content is going to be displayed. The content
adaptation is realized using XML/XSL, I.e. the content itself
is described using XML and its representation on a certain
mobile device is defined in XSL. The
aforementioned approaches focus primarily on how to
enable application programmers to exploit the new
features of the wired/wireless Internet [5]. However, they
Ignore or at least neglect the different
characteristics of the end devices and the reliability of the
transport media in the fixed and the wireless part of the
Internet. † In contrast to handheld devices, PCs and
Workstations that are usually used in the fixed Internet have
indeed sufficient resources, i.e. energy and processing
power to run complex algorithms. The different
capabilities of the end devices are very important with
respect to security issues. On one hand in wireless networks
eavesdropping is trivial due to the medium‘s ease of
accessibility. On the other hand exhaustive use of security
means, i.e. cipher mechanisms, is not possible due to the
limited resources of the handheld devices. Here the user is
always forced to decide between secure communication and
convenience of his mobile device. † The deployment of
wireless data networks has only extended partially the
traditional Internet. For example, there are still places where
connectivity cannot be guaranteed. This might be caused by the
error rates of the wireless link, which are several orders of
magnitude higher than the corresponding rates in wired
networks, or by the fact that no access points or base stations
are deployed in some regions. In parallel, the capabilities of
mobile devices are increasing constantly. For example the
‗high-end-class‘ of mobile devices is equipped with processors
that run at 400 MHz. Nevertheless, the question that calls for an
urgent answer is what platform developers can do tounify
the system behavior from the applicationperspective
and to allow programmers to take advantage of specific
performance improvements of the underlying technology. Such
platforms, which are designed with the hybrid network and the
high variety of devices in mind, are definitely needed.
A vertical approach, that takes into account the limitations of
the mobile devices, the special characteristics of the underlying
networks and protocols as well as hardware/software co-design
for platform components, will hopefully lead to better results.
To justify the expectation, we can consider that up to now most
middleware platforms did not differentiate between mobile
devices during run time. They considered mobile devices to be
thin or fat clients, but they did not provide means to configure
the platform to the current needs of the mobile and its user.
There is some work towards a more flexible approach, which
allows to support disconnected operations [21] and to configure
the platform in order to reduce power consumption [22].The
better a platform can adapt to the measured network
parameters, the better the application performance, and the
longer the duty cycles of the mobile devices. Very interesting
topics here are energy management and load balancing.
Optimizing the energy consumption and optimizing the
performance of the whole system are contradicting goals, at
least in certain situations. Authors in Ref. [23] discuss an
approach in which the security component of the platform
enables mobile devices to shift the computational intensive
operations of public key algorithms into the
infrastructure. From the Viewpoint of each single mobile
device this approach may be very appealing. But, the
performance of the whole system may be degraded. The
infrastructure servers are now taking an additional burden,
which may, for example, increase their response times, etc. If
the performance of the whole system is the major optimization
goal, it might be desirable to shift Workload to the mobile
devices. At least for the 400 MHz devices it seems feasible
to run parts of the platform locally, e.g. the selection of content
to the current location could be done at the mobile device.
Flexible concepts that allow the realization of different
optimization goals should be integrated into platforms within
the next years. These concepts should enable application
programmers and users to adapt the behavior of the platform
to their needs. From the energy viewpoint it may be
interesting to think about hardware/software co-design on the
platform level. In the protocol area this is done quite
successfully [24,25].In the middleware area the integration of
energy awareness is rather new. The integration of hardware
accelerators for cipher mechanisms into a location-aware
middleware is discussed in Ref. [26]. The interesting point
in this architecture is that the integration of the accelerators is
completely transparent to applications and even to the
platform. In Ref. [27] a broker-based approach towards an
energy-aware middleware is presented. Here it is proposed to
make operating system services energy-aware and to enable
applications to monitor and control parameters such as voltage
and task scheduling. Privacy is a crucial issue when it comes
to the acceptance of new services. A significant proportion of
the users of the fixed Internet are already concerned about their
privacy [28,29]. By using mobile devices to access the Internet,
IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163
__________________________________________________________________________________________
Volume: 01 Issue: 02 | Oct-2012, Available @ http://www.ijret.org 100
it becomes possible to connect the real- and cyber-world
behavior of Internet users. So, privacy becomes more and more
important. There are approaches [30–32] in which the user gets
the possibility to decide how much information she is willing to
reveal. In Ref. [33] the middleware intentionally reduces
the accuracy of the position information. This helps to
protect privacy but it cannot be used in systems that need an
accurate position to work properly. Ensuring privacy can only
be achieved by applying security mechanisms, i.e.
authentication, authorization, de-/encryption and digital
signatures. Especially the public key algorithms used for
authentication and digital signatures are computationally
expensive. So, here the limited resources of the wireless
devices have to be taken into account. An open point still, is
privacy enforcement, i.e. what can be done to ensure that
service providers adhere to what they promise in accordance
with their privacy policies.
CONVERGENCEOFNON-UNIFORM
COMMUNICATION CHANNELS
There is a lot of ongoing research on issues of convergence
of wired and wireless networks.
The research spans across a variety of subtopics from the
architectural aspects, which deal with the question ‗where
is the right place to achieve convergence‘ to protocol
design issues, which address the questions of best dealing
with the assumptions of wired networks or even with issues of
defining new metrics and methodologies for the evaluation of
protocol behavior. In the architectural arena, the end-to-end
argument was once again evaluated and criticized. The real
issue here is to provide means that enable error detection and
classification [34]. The informative source can be the local base
station, the protocol sender, or even the protocol receiver.
Given the nature of wireless networks, a local source may
play a very informative role in the protocol engineering
strategy and it may proxy the communication. The proxy
can actually locally correct the detected problems, buffer un-
acknowledged packets, preserve the transmission order, and
leave the transport layer unchanged, at least theoretically Issues
of concern here are plenty: Shall we add a burden to the base
station for managing the inefficiencies of TCP? 910 P.
Langendo¨rfer, V. Tsaousidis / Computer Communications 27
(2004) 908–913 shall we end up with sophisticated base
stations instead of sophisticated transport protocols? Can
we really resolve all the operational conflicts between TCP
and local protocols, such as the timers? Can we expect that
device heterogeneity—in terms of Functionality and
sophistication—will eclipse in the near future? Since some
level of heterogeneity in terms of protocol version or device
functionality is inevitable, the real question here is whether
it is more appropriate to deal with issues of heterogeneity at the
proxy level or at the transport level. And finally and more
generally, † when we detect an inefficiency at the transport
protocol, such as TCP‘s inefficiency to detect the nature of the
error (i.e. congestion or not), shall we change the network to
deal with the problem or shall we change the protocol itself?
The other category of proposals discusses modifications to
existing protocols, esp. TCP. Some proposals deal with
very specific problems, such as the handoff‘s impact on
TCP‘s performance. A reasonable proposal here is TCP
Freeze. However, there are several proposals that attempt
to deal with a wider range of problems. For example, TCP-
Probing deals with the error Classification prior to recovery
and hence it targets efficiency beyond the handoff procedure.
Similarly, TCP Real attempts to improve the impact of wireless
errors on smoothness, competing with TCP-Westwood. The
desirable behavior of TCP-Real is precisely to
demonstrate efficiency in Non-uniform environments with
wired or wireless networks and delay-sensitive or – tolerant
applications. Receiver-oriented error control incarnates the
property of the receiver to determine with better accuracy the
data delivery rate and the potential level of data loss. This
abrogates the impact of false assessments at the sender due to
lost or delayed acknowledgements. TCP-Real estimates the
level of contention allowing for early measures towards
congestion avoidance, which, in turn, reduces the damaging
transmission gaps. TCP-Westwood relies on bandwidth
estimation to set the slow start threshold and the congestion
window upon three duplicate acknowledgments or timeout. No
specific mechanism exists to support error classification and the
corresponding recovery tactics for wired/wireless networks,
albeit the proposed mechanism appears to be relatively
effective over symmetric wireless links due to its efficient
congestion control. In summary, the framework for potential
improvements is circumscribed by the application requirements
and the Limitations of TCP‘s congestion control. We identify
four distinct subtopics of protocol engineering related with the
convergence of wired/wireless networks.
Additive increase is not efficient when the network dynamics
encompass rapid changes of bandwidth availability. For
example, when short flows that cause congestion complete their
task, bandwidth becomes available. Similarly, when a handoff
is completed in a cellular network, the entire channel‘s
bandwidth becomes available.
Multiplicative decrease causes transmission gaps that hurt the
performance of real-time applications that experience jitter
and degraded good put. Furthermore, multiplicative
decrease with a factor of 1/2 or a window adjustment to
two packets characterizes a rather conservative strategy
Note that multiplicative increase applies also in cases of
wireless errors. Departing from AIMD show that, by
removing a—what can be characterized as a minor technical
flaw, both smoothness and responsiveness of the
algorithm can be improved.
Error detection lacks an appropriate classification module that
would permit a responsive strategy, oriented by the nature of
potential errors. That is, when errors appear to be transient due
IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163
__________________________________________________________________________________________
Volume: 01 Issue: 02 | Oct-2012, Available @ http://www.ijret.org 101
to short-lived flows or random wireless interference,
congestion control mechanisms (i.e. timeout extension and
multiplicative window adjustment) are triggered unduly. The
insufficient error detection/classification may also lead to
unfair bandwidth allocation in mixed wired/wireless networks.
By default, flows that experience wireless errors do not balance
their bandwidth loss with a more aggressive recovery although
such behavior could be justified: flows that experienced no
losses have occupied extra bandwidth at the router temporarily,
when the wireless errors forced some senders to back off. This
situation is discussed as an open issue in Ref. [34].
Source-based decision on the transmission rate, based on the
pace of the acknowledgements, necessarily incorporates the
potentially asymmetric characteristics (e.g. ack delays and/or
losses) of the reverse path, which is common in wireless and
satellite networks. Hence, the sender‘s transmission rate does
not always reflect the capacity of the forward path. This
situation has a direct impact on efficiency since available
bandwidth remains unexploited. In addition to the
wired/wireless convergence, heterogeneity exists also at the
level of bandwidth and capacity. Being designed with persistent
congestion in mind, traditional TCP does not scale well to G-bit
networks and beyond. Congestion itself exhibits different
properties in such networks (i.e. more transient), the amount of
transported data increases rapidly and consequently the amount
of lost data can be in the order of hundreds or P. Langendo¨rfer,
V. Tsaoussidis / Computer Communications 27 (2004) 908–
913 911 thousands of packets, the timeout and RTT-based
transmission does not allow for efficient bandwidth
exploitation, and the ack–clock limits further the
transmission rate. Some mechanisms have been proposed to
improve the performance of the protocol over high-speed
links. Fast TCP attempts to predict the highest data at
which data can be transmitted without losses. XCP appears to
be a promising approach but requires router level assistance.
AIMD-FC on the other hand, relies on‗fixing‘ the details of
original AIMD in order for it to reach an equilibrium faster
and achieve much higher efficiency. The above three
approaches correspond to different fixes but they all
improve the enhancements of TCP to allow communication at
higher rates. We note that it is important to reach a standard
that does not only allow TCP to work well in high-speed
networks but also in low-speed ones. Else, the solution will not
bridge the gap but instead, it may make it worse. New TCPs
therefore, including Fast TCP, should be evaluated from this
perspective as well.
CONCLUSIONS
There is a lot of research going on in different fields with the
aim to diminish the differences between the wired and the
wireless part of the Internet. People are looking at the limited
resources of the wireless devices from the operating systems
viewpoint, from the protocol viewpoint and from the
middleware viewpoint. This clearly indicates that the
integration of the mobile and the fixed Internet is a very
complex task. In addition the question of how protocol and
platform functionality is realized is crucial to what can be
achieved. For example, the use of hardware accelerators
helps to reduce the power consumption dramatically.
The achievements so far are very promising. Despite the
complexity of the task, there already applications available,
which work well, even with the hybrid architecture of the
Wireless Internet. We expect that the number of successful
mobile applications will significantly increase as soon as
handheld devices become more common and a better
coverage with WLAN and 3G networks is provided. From the
technical point of view, there are still several problems to be
solved. On one hand, it appears a natural approach to isolate
these problems and to try to tackle them independently;
applying layer-specific methods. On the other hand, an
integrated approach in which a problem is considered from a
global perspective may lead to a better solution. There are
several groups that follow this approach. In the end, both
methodologies may provide complementary results.
REFERENCES
[1] J. Burrell, G.K. Gay, E-graffiti: evaluating real-world use of
a contextaware system, Interacting with Computers (Special
Issue on Universal Usability) 14 (4) (2002) 301–312.
[2] W.G. Griswold, et al., Active Campus Sustaining
Educational Communities through Mobile Technology,
Technical Report #CS2002-0714, University of California,
San Diego, 2002.
[3] Metro Group, The Technical Concepts implemented at the
Extra Future Store, available at: http://www.future-
store.org/servlet/PB/show/1000815/pa-events-ecr-bookl-
eng.pdf, last visited Dec. 2003
[4] L. Mehrmann, B. Kreller, Context-aware
Community Applications For Mobile Youngsters, In:
Proceedings of the First Mobile Communications Summit,
2001.
[5] A. Luebke, From Internet in the car towards cars in the
Internet,presentation at the DLR Workshop Quo Vadis
Wireless Internet,2003, abstract available at:
http://www.gzvb.de/informationssysteme/
abstracts/Luebke.html, last viewed December 2003.
[6] M. Schuster, Body-Sensor Wireless Networks Monitoring
Patients‘ Health with BAN, FOKUS-Fraunhofer Institute for
Open Communication Systems Competence Center CATS,
availableat
http://www.fokus.fhg.de/medizin/download/BAN_E.pdf last
visited Dec. 2003
[7] Object Management Group, The Common Object
Request Broker: Architecture and Specification, revision 2.2,
OMG Document Technical Report, 98-07-01, 1998.
[8] Microsoft Corporation, DCOM Technical Overview, 1996,
http://msdn.microsoft.com/library/default.asp?url ¼
/library/en-us/ dndcom/html/msdn_dcomtec.asp, last viewed
September 24, 2003.
[9] E. Pitt, K. McNiff, java.rmi: The Guide to Remote
IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163
__________________________________________________________________________________________
Volume: 01 Issue: 02 | Oct-2012, Available @ http://www.ijret.org 102
Method Invocation, Addison-Wesley, Boston, 2001.
[10] B. Keller, A.S. Park, J. Meggers, G. Forsgern, E. Kovacs,
M. Rosinus, UMTS: a middleware architecture and
mobile API approach, IEEE Personal Communications 5 (2)
(1998) 32–38.
[11] R. Jose´, A. Moreira, F. Meneses, G. Coulson, An Open
Architecture for Developing Mobile Location-based
Applications Over the Internet, Proceeding of the Sixth IEEE
Symposium on Computers and Communications, 3–5 July,
IEEE Computer Society,
Los Alamitos, 2001, ISBN 0-7695-1177-5.
[12] F. Hohl, U. Kubach, A. Leonhardi, M. Schwehm, K.
Rothermel, Nexus: an open global infrastructure for spatial-
aware applications, Proceedings of the Fifth International
Conference on Mobile
Computing and Networking (MobiCom 99), August 15–19,
ACM Press, Seattle, Washington, USA, 1999.
[13] A. Pashtan, R. Blattler, A. Heusser, P. Scheuermann,
CATIS: A Context-Aware Tourist Information System,
Poceedings of the
Fourth International Workshop of Mobile Computing, June
17–18, Rostock, Germany, 2003.
[14] A. Escudero, G.Q. Maguire, Role(s) of a proxy in location
based services. PIMRC 2002, Thirteenth IEEE International
Symposium on
Personal, Indoor and Mobile Radio Communications.
16–18
September, Lisboa, Portugal, 2002.
[15] condat AG: Skyware, available at
http://www.condat.de/english/pdf/Skyware_eng.pdf,last visited
Dec 2003
[16] H. Maab, Location-aware mobile applications based on
directoryservices, MONET 3 (2) (1998) 157–173.
[17] R. Kraemer, P. Schwander, Bluetooth based wireless
internet applications for indoor hot spots: experience of a
successful experiment during CeBit 2001, Computer Networks
(2003).
[18] P. Langendoerfer, O. Maye, Z. Dyka, R. Sorge, R.
Winkler, R. Kraemer, in: Q. Mahmoud (Ed.), Middleware
for Location-based Services: Design and Implementation
Issues, Middleware for Communications, Wiley, New York,
2004.
[19] St. Volz, J.-M. Bonfiger, Integration of Spatial Data
within a Generic Platform for Location-Based Applications,
In: Proceedings of the Joint International Symposium on
Geospatial Theory, Processing and Applications,
2002.912 P. Langendo¨rfer, V. Tsaoussidis / Computer
Communications 27 (2004) 908–913
[20] Th. Schwotzer, K. Geihs, Shark—a System for
Management, Synchronization and Exchange of
Knowledge in Mobile User
Groups, Journal of Universal Computer Science 8 (6) (2002).
[21] B. Wuest, O. Dro¨gehorn, K. David, FAME2: Software
Architecture for B3G and 4G Networks, First Summit on
Mobile and Wireless Communication, Aveiro, Portugal, 2003,
pp. 837–841.
[22] S. Mohapatra, N. Venkatasubramanian, PARM: Power
Aware Reconfigurable Middleware, IEEE International
Conference on Distributed Computer Systems (ICDCS-23),
Rhode Island, May, 2003.
[23] P. Langendo¨rfer, Z. Dyka, O. Maye, R. Kraemer, A Low
Power Security Architecture for Mobile Commerce,
Proceedings of the Fifth IEEE CAS Workshop on Wireless
Communications and Networking (2002).
[24] J. Riihijaervi, P. Maehoenen, M.J. Saaranen, J. Roivainen,
J.-P. Soininen, Providing network connectivity for small
appliances: a functionally minimized embedded web server,
IEEE Communications Magazine October (2001).
[25] E. Grass, et al., On the single-chip implementation of a
Hiperlan/2 and IEEE 802.11a capable modem, IEEE Personal
Communications Magazine December (2001).
[26] P. Langendoerfer, Z. Dyka, F. Vater, O. Maye, Rolf
Kraemer: A vertical approach towards energy-efficient
application of cipher mechanisms in hot-spots running
location-aware services, In: Proceedings of the International
Conference on Advances in the Internet, Processing, Systems,
and Interdisciplinary Research, 2003. [27] R. Cornea, et al.,
ServiceFORGE: A Software Architecture for Power and
Quality Aware Services, Workshop at the International FME
Symposium, September, 2003. [28] L.F. Cranor, Beyond
Concern: Under-standing Net Users‘ Attitudes About Online
Privacy, in: I. Vogelsang, B.M. Compaine (Eds.), The
Internet Upheaval: Raising Questions, Seeking Answers in
Communications Policy, The MIT Press, Cambridge,
Massachusetts, 2000, pp. 47–70.
[29] Jupiter Research: Consumers worried about online
privacy, 2002 available at:
http://www.nua.com/surveys/index.cgi?f ¼ VS&art_id
¼ 905358019&rel ¼ true; last visited Dec. 03
[30] P. Langendo¨rfer, R. Kraemer, Towards User Defined
Privacy in location-aware Platforms, Proceeding of the
Third International Conference on Internet Computing,
CSREA Press, USA, 2002.
[31] M. Bennicke, P. Langendo¨rfer, Towards Automatic
Negotiation of Privacy Contracts for Internet Services,
Proceeding of the 11th IEEE Conference on Networks (ICON
2003), IEEE Society Press, New York, 2003.
[32] W. Wagealla, S. Terzis, C. English, Trust-based
Model for Privacy Control in Context-aware Systems,
Second Workshop on Security in Ubiquitous Computing,
Ubicomp, 2003.
[33] M. Gruteser, D. Grunwald, Anonymous Usage of
Location- Based Services Through Spatial and Temporal
Cloaking ACM/USENIX International Conference on
Mobile Systems, Applications, and Services (MobiSys), 2003.
[34] V. Tsaoussidis, I. Matta, Open issues on TCP for Mobile
Computing, Journal of Wireless Communications and Mobile
Computing (WCMC) 2 (1) (2002) 3–20. Wiley, New York.
[35] H. Balakrishnan, S. Seshan, E. Amir, R.H. Katz,
Improving TCP/IP Performance over Wireless Networks,
In: Proceedings of ACM Mobicom ‗95, November, 1995
IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163
__________________________________________________________________________________________
Volume: 01 Issue: 02 | Oct-2012, Available @ http://www.ijret.org 103
BIOGRAPHIES:
A.Siles Balasingh .M.Tech (I.T) .He is
currently working as Lecturer in
Department of Computer Science and
Engineering in St. Joseph College of
Engineering and Technology, Dar Es
Salaam, Tanzania, East Africa. He has 4
publications to his credit. He has guided
more than 20 projects to final year
B.E/B.Tech students with good industry
and teaching experience. His areas of
interest in Computer Networks, Computer
Networks and security, Neural networks
and sBioinformatics Computer Architecture
and Ethical hacking.
N.Surenth M.Tech (I.T) He is currently
working as Lecturer in of Department in
Computer Science and Engineering in St.
Joseph College of Engineering and
Technology, Dar Es Salaam, Tanzania,
East Africa. He has guided more than 15
projects to final year B.E/B.Tech students
and his area of interest in Computer
Networks and Artificial Intelligence.

Contenu connexe

Tendances

AppImpact: A Framework for Mobile Technology in Behavioral Healthcare
AppImpact: A Framework for Mobile Technology in Behavioral HealthcareAppImpact: A Framework for Mobile Technology in Behavioral Healthcare
AppImpact: A Framework for Mobile Technology in Behavioral HealthcareEd Dodds
 
PROCEDURE OF EFFECTIVE USE OF CLOUDLETS IN WIRELESS METROPOLITAN AREA NETWORK...
PROCEDURE OF EFFECTIVE USE OF CLOUDLETS IN WIRELESS METROPOLITAN AREA NETWORK...PROCEDURE OF EFFECTIVE USE OF CLOUDLETS IN WIRELESS METROPOLITAN AREA NETWORK...
PROCEDURE OF EFFECTIVE USE OF CLOUDLETS IN WIRELESS METROPOLITAN AREA NETWORK...IJCNCJournal
 
Node selection in p2 p content sharing service in mobile cellular networks wi...
Node selection in p2 p content sharing service in mobile cellular networks wi...Node selection in p2 p content sharing service in mobile cellular networks wi...
Node selection in p2 p content sharing service in mobile cellular networks wi...Uvaraj Shan
 
Cooperative hierarchical based edge-computing approach for resources allocati...
Cooperative hierarchical based edge-computing approach for resources allocati...Cooperative hierarchical based edge-computing approach for resources allocati...
Cooperative hierarchical based edge-computing approach for resources allocati...IJECEIAES
 
A Survey of MAC Layer Issues and Application layer Protocols for Machine-to-M...
A Survey of MAC Layer Issues and Application layer Protocols for Machine-to-M...A Survey of MAC Layer Issues and Application layer Protocols for Machine-to-M...
A Survey of MAC Layer Issues and Application layer Protocols for Machine-to-M...IRJET Journal
 
ERMO2 algorithm: an energy efficient mobility management in mobile cloud comp...
ERMO2 algorithm: an energy efficient mobility management in mobile cloud comp...ERMO2 algorithm: an energy efficient mobility management in mobile cloud comp...
ERMO2 algorithm: an energy efficient mobility management in mobile cloud comp...IJECEIAES
 
Dr.Wagdy Anis_Cover Letter
Dr.Wagdy Anis_Cover LetterDr.Wagdy Anis_Cover Letter
Dr.Wagdy Anis_Cover LetterDr. Wagdy Aziz
 
A distributed agent media access framework
A distributed agent media access frameworkA distributed agent media access framework
A distributed agent media access frameworkcsandit
 
An analysis of a large scale wireless image distribution system deployment
An analysis of a large scale wireless image distribution system deploymentAn analysis of a large scale wireless image distribution system deployment
An analysis of a large scale wireless image distribution system deploymentConference Papers
 
EFFECTIVE BANDWIDTH ANALYSIS OF MIMO BASED MOBILE CLOUD COMPUTING
EFFECTIVE BANDWIDTH ANALYSIS OF MIMO BASED MOBILE CLOUD COMPUTINGEFFECTIVE BANDWIDTH ANALYSIS OF MIMO BASED MOBILE CLOUD COMPUTING
EFFECTIVE BANDWIDTH ANALYSIS OF MIMO BASED MOBILE CLOUD COMPUTINGIJCI JOURNAL
 
Efficient Local Resource management for Wireless Devices integration
Efficient Local Resource management for Wireless Devices integrationEfficient Local Resource management for Wireless Devices integration
Efficient Local Resource management for Wireless Devices integrationEditor Jacotech
 
A survey on cost effective survivable network design in wireless access network
A survey on cost effective survivable network design in wireless access networkA survey on cost effective survivable network design in wireless access network
A survey on cost effective survivable network design in wireless access networkijcses
 

Tendances (14)

Ad hoc networks technical issues on radio links security & qo s
Ad hoc networks technical issues on radio links security & qo sAd hoc networks technical issues on radio links security & qo s
Ad hoc networks technical issues on radio links security & qo s
 
AppImpact: A Framework for Mobile Technology in Behavioral Healthcare
AppImpact: A Framework for Mobile Technology in Behavioral HealthcareAppImpact: A Framework for Mobile Technology in Behavioral Healthcare
AppImpact: A Framework for Mobile Technology in Behavioral Healthcare
 
PROCEDURE OF EFFECTIVE USE OF CLOUDLETS IN WIRELESS METROPOLITAN AREA NETWORK...
PROCEDURE OF EFFECTIVE USE OF CLOUDLETS IN WIRELESS METROPOLITAN AREA NETWORK...PROCEDURE OF EFFECTIVE USE OF CLOUDLETS IN WIRELESS METROPOLITAN AREA NETWORK...
PROCEDURE OF EFFECTIVE USE OF CLOUDLETS IN WIRELESS METROPOLITAN AREA NETWORK...
 
Node selection in p2 p content sharing service in mobile cellular networks wi...
Node selection in p2 p content sharing service in mobile cellular networks wi...Node selection in p2 p content sharing service in mobile cellular networks wi...
Node selection in p2 p content sharing service in mobile cellular networks wi...
 
Cooperative hierarchical based edge-computing approach for resources allocati...
Cooperative hierarchical based edge-computing approach for resources allocati...Cooperative hierarchical based edge-computing approach for resources allocati...
Cooperative hierarchical based edge-computing approach for resources allocati...
 
A Survey of MAC Layer Issues and Application layer Protocols for Machine-to-M...
A Survey of MAC Layer Issues and Application layer Protocols for Machine-to-M...A Survey of MAC Layer Issues and Application layer Protocols for Machine-to-M...
A Survey of MAC Layer Issues and Application layer Protocols for Machine-to-M...
 
ERMO2 algorithm: an energy efficient mobility management in mobile cloud comp...
ERMO2 algorithm: an energy efficient mobility management in mobile cloud comp...ERMO2 algorithm: an energy efficient mobility management in mobile cloud comp...
ERMO2 algorithm: an energy efficient mobility management in mobile cloud comp...
 
Dr.Wagdy Anis_Cover Letter
Dr.Wagdy Anis_Cover LetterDr.Wagdy Anis_Cover Letter
Dr.Wagdy Anis_Cover Letter
 
A distributed agent media access framework
A distributed agent media access frameworkA distributed agent media access framework
A distributed agent media access framework
 
An analysis of a large scale wireless image distribution system deployment
An analysis of a large scale wireless image distribution system deploymentAn analysis of a large scale wireless image distribution system deployment
An analysis of a large scale wireless image distribution system deployment
 
EFFECTIVE BANDWIDTH ANALYSIS OF MIMO BASED MOBILE CLOUD COMPUTING
EFFECTIVE BANDWIDTH ANALYSIS OF MIMO BASED MOBILE CLOUD COMPUTINGEFFECTIVE BANDWIDTH ANALYSIS OF MIMO BASED MOBILE CLOUD COMPUTING
EFFECTIVE BANDWIDTH ANALYSIS OF MIMO BASED MOBILE CLOUD COMPUTING
 
P47
P47P47
P47
 
Efficient Local Resource management for Wireless Devices integration
Efficient Local Resource management for Wireless Devices integrationEfficient Local Resource management for Wireless Devices integration
Efficient Local Resource management for Wireless Devices integration
 
A survey on cost effective survivable network design in wireless access network
A survey on cost effective survivable network design in wireless access networkA survey on cost effective survivable network design in wireless access network
A survey on cost effective survivable network design in wireless access network
 

En vedette

Wear characteristics of pure aluminium, al alloy & al-alumina metal mtrix...
Wear characteristics of pure aluminium, al alloy & al-alumina metal mtrix...Wear characteristics of pure aluminium, al alloy & al-alumina metal mtrix...
Wear characteristics of pure aluminium, al alloy & al-alumina metal mtrix...eSAT Journals
 
Performance comparison of row per slave and rows set per slave method in pvm ...
Performance comparison of row per slave and rows set per slave method in pvm ...Performance comparison of row per slave and rows set per slave method in pvm ...
Performance comparison of row per slave and rows set per slave method in pvm ...eSAT Journals
 
Facial expression identification using four bit co- occurrence matrixfeatures...
Facial expression identification using four bit co- occurrence matrixfeatures...Facial expression identification using four bit co- occurrence matrixfeatures...
Facial expression identification using four bit co- occurrence matrixfeatures...eSAT Journals
 
Advanced manufacturing technology adoption in manufacturing companies in kenya
Advanced manufacturing technology adoption in manufacturing companies in kenyaAdvanced manufacturing technology adoption in manufacturing companies in kenya
Advanced manufacturing technology adoption in manufacturing companies in kenyaeSAT Journals
 
Earthquake prediction by using evidential reasoning approach
Earthquake prediction by using evidential reasoning approachEarthquake prediction by using evidential reasoning approach
Earthquake prediction by using evidential reasoning approacheSAT Journals
 
Quality of service (qos) in wi max
Quality of service (qos) in wi maxQuality of service (qos) in wi max
Quality of service (qos) in wi maxeSAT Journals
 
To study the application of nanorefrigerant in refrigeration system a review
To study the application of nanorefrigerant in refrigeration system a reviewTo study the application of nanorefrigerant in refrigeration system a review
To study the application of nanorefrigerant in refrigeration system a revieweSAT Journals
 
Android application to locate and track mobile phones(aaltm) an implementati...
Android application to locate and track mobile phones(aaltm)  an implementati...Android application to locate and track mobile phones(aaltm)  an implementati...
Android application to locate and track mobile phones(aaltm) an implementati...eSAT Journals
 
A treament of domestic sewage and generation of bio sludge using natural coag...
A treament of domestic sewage and generation of bio sludge using natural coag...A treament of domestic sewage and generation of bio sludge using natural coag...
A treament of domestic sewage and generation of bio sludge using natural coag...eSAT Journals
 
Modeling and prevention of cell counting based attacks on tor
Modeling and prevention of cell counting based attacks on torModeling and prevention of cell counting based attacks on tor
Modeling and prevention of cell counting based attacks on toreSAT Journals
 
Selection of alignment for feeder canal from pillaipally flood flow canal to ...
Selection of alignment for feeder canal from pillaipally flood flow canal to ...Selection of alignment for feeder canal from pillaipally flood flow canal to ...
Selection of alignment for feeder canal from pillaipally flood flow canal to ...eSAT Journals
 
A review on vibration mitigation of boring bar using passive damping techniques
A review on vibration mitigation of boring bar using passive damping techniquesA review on vibration mitigation of boring bar using passive damping techniques
A review on vibration mitigation of boring bar using passive damping techniqueseSAT Journals
 
Design and analysis of automated spray gun for rh vessel
Design and analysis of automated spray gun for rh vesselDesign and analysis of automated spray gun for rh vessel
Design and analysis of automated spray gun for rh vesseleSAT Journals
 
Experimental study on shear strength behavior of super plasticized fiber rein...
Experimental study on shear strength behavior of super plasticized fiber rein...Experimental study on shear strength behavior of super plasticized fiber rein...
Experimental study on shear strength behavior of super plasticized fiber rein...eSAT Journals
 
All optical network design with even and odd nodes
All optical network design with even and odd nodesAll optical network design with even and odd nodes
All optical network design with even and odd nodeseSAT Journals
 
Voice recognition based advance patients room automation
Voice recognition based advance patients room automationVoice recognition based advance patients room automation
Voice recognition based advance patients room automationeSAT Journals
 
A critical study on availability and capacity utilization of side discharge l...
A critical study on availability and capacity utilization of side discharge l...A critical study on availability and capacity utilization of side discharge l...
A critical study on availability and capacity utilization of side discharge l...eSAT Journals
 
Balancing the line by using heuristic method based on cpm in salbp –a case study
Balancing the line by using heuristic method based on cpm in salbp –a case studyBalancing the line by using heuristic method based on cpm in salbp –a case study
Balancing the line by using heuristic method based on cpm in salbp –a case studyeSAT Journals
 
Design and analysis of internal combustion compressed air hydrid engine (inco)
Design and analysis of internal combustion compressed air hydrid engine (inco)Design and analysis of internal combustion compressed air hydrid engine (inco)
Design and analysis of internal combustion compressed air hydrid engine (inco)eSAT Journals
 

En vedette (19)

Wear characteristics of pure aluminium, al alloy & al-alumina metal mtrix...
Wear characteristics of pure aluminium, al alloy & al-alumina metal mtrix...Wear characteristics of pure aluminium, al alloy & al-alumina metal mtrix...
Wear characteristics of pure aluminium, al alloy & al-alumina metal mtrix...
 
Performance comparison of row per slave and rows set per slave method in pvm ...
Performance comparison of row per slave and rows set per slave method in pvm ...Performance comparison of row per slave and rows set per slave method in pvm ...
Performance comparison of row per slave and rows set per slave method in pvm ...
 
Facial expression identification using four bit co- occurrence matrixfeatures...
Facial expression identification using four bit co- occurrence matrixfeatures...Facial expression identification using four bit co- occurrence matrixfeatures...
Facial expression identification using four bit co- occurrence matrixfeatures...
 
Advanced manufacturing technology adoption in manufacturing companies in kenya
Advanced manufacturing technology adoption in manufacturing companies in kenyaAdvanced manufacturing technology adoption in manufacturing companies in kenya
Advanced manufacturing technology adoption in manufacturing companies in kenya
 
Earthquake prediction by using evidential reasoning approach
Earthquake prediction by using evidential reasoning approachEarthquake prediction by using evidential reasoning approach
Earthquake prediction by using evidential reasoning approach
 
Quality of service (qos) in wi max
Quality of service (qos) in wi maxQuality of service (qos) in wi max
Quality of service (qos) in wi max
 
To study the application of nanorefrigerant in refrigeration system a review
To study the application of nanorefrigerant in refrigeration system a reviewTo study the application of nanorefrigerant in refrigeration system a review
To study the application of nanorefrigerant in refrigeration system a review
 
Android application to locate and track mobile phones(aaltm) an implementati...
Android application to locate and track mobile phones(aaltm)  an implementati...Android application to locate and track mobile phones(aaltm)  an implementati...
Android application to locate and track mobile phones(aaltm) an implementati...
 
A treament of domestic sewage and generation of bio sludge using natural coag...
A treament of domestic sewage and generation of bio sludge using natural coag...A treament of domestic sewage and generation of bio sludge using natural coag...
A treament of domestic sewage and generation of bio sludge using natural coag...
 
Modeling and prevention of cell counting based attacks on tor
Modeling and prevention of cell counting based attacks on torModeling and prevention of cell counting based attacks on tor
Modeling and prevention of cell counting based attacks on tor
 
Selection of alignment for feeder canal from pillaipally flood flow canal to ...
Selection of alignment for feeder canal from pillaipally flood flow canal to ...Selection of alignment for feeder canal from pillaipally flood flow canal to ...
Selection of alignment for feeder canal from pillaipally flood flow canal to ...
 
A review on vibration mitigation of boring bar using passive damping techniques
A review on vibration mitigation of boring bar using passive damping techniquesA review on vibration mitigation of boring bar using passive damping techniques
A review on vibration mitigation of boring bar using passive damping techniques
 
Design and analysis of automated spray gun for rh vessel
Design and analysis of automated spray gun for rh vesselDesign and analysis of automated spray gun for rh vessel
Design and analysis of automated spray gun for rh vessel
 
Experimental study on shear strength behavior of super plasticized fiber rein...
Experimental study on shear strength behavior of super plasticized fiber rein...Experimental study on shear strength behavior of super plasticized fiber rein...
Experimental study on shear strength behavior of super plasticized fiber rein...
 
All optical network design with even and odd nodes
All optical network design with even and odd nodesAll optical network design with even and odd nodes
All optical network design with even and odd nodes
 
Voice recognition based advance patients room automation
Voice recognition based advance patients room automationVoice recognition based advance patients room automation
Voice recognition based advance patients room automation
 
A critical study on availability and capacity utilization of side discharge l...
A critical study on availability and capacity utilization of side discharge l...A critical study on availability and capacity utilization of side discharge l...
A critical study on availability and capacity utilization of side discharge l...
 
Balancing the line by using heuristic method based on cpm in salbp –a case study
Balancing the line by using heuristic method based on cpm in salbp –a case studyBalancing the line by using heuristic method based on cpm in salbp –a case study
Balancing the line by using heuristic method based on cpm in salbp –a case study
 
Design and analysis of internal combustion compressed air hydrid engine (inco)
Design and analysis of internal combustion compressed air hydrid engine (inco)Design and analysis of internal combustion compressed air hydrid engine (inco)
Design and analysis of internal combustion compressed air hydrid engine (inco)
 

Similaire à The common challenges of mobile internet for up coming generation

IRJET- Improve Client Performance in Client Server Mobile Computing System us...
IRJET- Improve Client Performance in Client Server Mobile Computing System us...IRJET- Improve Client Performance in Client Server Mobile Computing System us...
IRJET- Improve Client Performance in Client Server Mobile Computing System us...IRJET Journal
 
Collation of Mobile operatives
Collation of Mobile operativesCollation of Mobile operatives
Collation of Mobile operativesIJERA Editor
 
Contemporary Energy Optimization for Mobile and Cloud Environment
Contemporary Energy Optimization for Mobile and Cloud EnvironmentContemporary Energy Optimization for Mobile and Cloud Environment
Contemporary Energy Optimization for Mobile and Cloud Environmentijceronline
 
DESIGN AND IMPLEMENTATION OF INTELLIGENT COMMUNITY SYSTEM BASED ON THIN CLIEN...
DESIGN AND IMPLEMENTATION OF INTELLIGENT COMMUNITY SYSTEM BASED ON THIN CLIEN...DESIGN AND IMPLEMENTATION OF INTELLIGENT COMMUNITY SYSTEM BASED ON THIN CLIEN...
DESIGN AND IMPLEMENTATION OF INTELLIGENT COMMUNITY SYSTEM BASED ON THIN CLIEN...ijasuc
 
DESIGN AND IMPLEMENTATION OF INTELLIGENT COMMUNITY SYSTEM BASED ON THIN CLIEN...
DESIGN AND IMPLEMENTATION OF INTELLIGENT COMMUNITY SYSTEM BASED ON THIN CLIEN...DESIGN AND IMPLEMENTATION OF INTELLIGENT COMMUNITY SYSTEM BASED ON THIN CLIEN...
DESIGN AND IMPLEMENTATION OF INTELLIGENT COMMUNITY SYSTEM BASED ON THIN CLIEN...ijasuc
 
Implementing K-Out-Of-N Computing For Fault Tolerant Processing In Mobile and...
Implementing K-Out-Of-N Computing For Fault Tolerant Processing In Mobile and...Implementing K-Out-Of-N Computing For Fault Tolerant Processing In Mobile and...
Implementing K-Out-Of-N Computing For Fault Tolerant Processing In Mobile and...IJERA Editor
 
IRJET- Resource Management in Mobile Cloud Computing: MSaaS & MPaaS with Femt...
IRJET- Resource Management in Mobile Cloud Computing: MSaaS & MPaaS with Femt...IRJET- Resource Management in Mobile Cloud Computing: MSaaS & MPaaS with Femt...
IRJET- Resource Management in Mobile Cloud Computing: MSaaS & MPaaS with Femt...IRJET Journal
 
A Survey of Cyber foraging systems: Open Issues, Research Challenges
A Survey of Cyber foraging systems: Open Issues, Research ChallengesA Survey of Cyber foraging systems: Open Issues, Research Challenges
A Survey of Cyber foraging systems: Open Issues, Research ChallengesEswar Publications
 
Finding your Way in the Fog: Towards a Comprehensive Definition of Fog Computing
Finding your Way in the Fog: Towards a Comprehensive Definition of Fog ComputingFinding your Way in the Fog: Towards a Comprehensive Definition of Fog Computing
Finding your Way in the Fog: Towards a Comprehensive Definition of Fog ComputingHarshitParkar6677
 
PERFORMANCE ANALYSIS OF MOBILE DATA OFFLOADING IN HETEROGENEOUS NETWORKS
 PERFORMANCE ANALYSIS OF MOBILE DATA OFFLOADING IN HETEROGENEOUS NETWORKS PERFORMANCE ANALYSIS OF MOBILE DATA OFFLOADING IN HETEROGENEOUS NETWORKS
PERFORMANCE ANALYSIS OF MOBILE DATA OFFLOADING IN HETEROGENEOUS NETWORKSnexgentechnology
 
IRJET- Virtual Network Recognition and Optimization in SDN-Enabled Cloud Env...
IRJET-  Virtual Network Recognition and Optimization in SDN-Enabled Cloud Env...IRJET-  Virtual Network Recognition and Optimization in SDN-Enabled Cloud Env...
IRJET- Virtual Network Recognition and Optimization in SDN-Enabled Cloud Env...IRJET Journal
 
Machine Learning 5G Federated Learning.pdf
Machine Learning 5G Federated Learning.pdfMachine Learning 5G Federated Learning.pdf
Machine Learning 5G Federated Learning.pdfadeyimikaipaye
 
MOBILE CLOUD COMPUTING fundamental and basic
MOBILE CLOUD COMPUTING fundamental and basicMOBILE CLOUD COMPUTING fundamental and basic
MOBILE CLOUD COMPUTING fundamental and basicranjana dalwani
 
Mobile cloud computing as future for mobile applications
Mobile cloud computing as future for mobile applicationsMobile cloud computing as future for mobile applications
Mobile cloud computing as future for mobile applicationseSAT Publishing House
 
Mobile Fog: A Programming Model for Large–Scale Applications on the Internet ...
Mobile Fog: A Programming Model for Large–Scale Applications on the Internet ...Mobile Fog: A Programming Model for Large–Scale Applications on the Internet ...
Mobile Fog: A Programming Model for Large–Scale Applications on the Internet ...HarshitParkar6677
 
A Review On Wireless Grid Computing
A Review On Wireless Grid ComputingA Review On Wireless Grid Computing
A Review On Wireless Grid ComputingJim Jimenez
 
A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing
A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing
A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing IJECEIAES
 
Cloud-Based Impact for Mobile and Pervasive Environments: A Survey
Cloud-Based Impact for Mobile and Pervasive Environments: A SurveyCloud-Based Impact for Mobile and Pervasive Environments: A Survey
Cloud-Based Impact for Mobile and Pervasive Environments: A SurveyIOSR Journals
 

Similaire à The common challenges of mobile internet for up coming generation (20)

IRJET- Improve Client Performance in Client Server Mobile Computing System us...
IRJET- Improve Client Performance in Client Server Mobile Computing System us...IRJET- Improve Client Performance in Client Server Mobile Computing System us...
IRJET- Improve Client Performance in Client Server Mobile Computing System us...
 
Collation of Mobile operatives
Collation of Mobile operativesCollation of Mobile operatives
Collation of Mobile operatives
 
Contemporary Energy Optimization for Mobile and Cloud Environment
Contemporary Energy Optimization for Mobile and Cloud EnvironmentContemporary Energy Optimization for Mobile and Cloud Environment
Contemporary Energy Optimization for Mobile and Cloud Environment
 
DESIGN AND IMPLEMENTATION OF INTELLIGENT COMMUNITY SYSTEM BASED ON THIN CLIEN...
DESIGN AND IMPLEMENTATION OF INTELLIGENT COMMUNITY SYSTEM BASED ON THIN CLIEN...DESIGN AND IMPLEMENTATION OF INTELLIGENT COMMUNITY SYSTEM BASED ON THIN CLIEN...
DESIGN AND IMPLEMENTATION OF INTELLIGENT COMMUNITY SYSTEM BASED ON THIN CLIEN...
 
DESIGN AND IMPLEMENTATION OF INTELLIGENT COMMUNITY SYSTEM BASED ON THIN CLIEN...
DESIGN AND IMPLEMENTATION OF INTELLIGENT COMMUNITY SYSTEM BASED ON THIN CLIEN...DESIGN AND IMPLEMENTATION OF INTELLIGENT COMMUNITY SYSTEM BASED ON THIN CLIEN...
DESIGN AND IMPLEMENTATION OF INTELLIGENT COMMUNITY SYSTEM BASED ON THIN CLIEN...
 
Implementing K-Out-Of-N Computing For Fault Tolerant Processing In Mobile and...
Implementing K-Out-Of-N Computing For Fault Tolerant Processing In Mobile and...Implementing K-Out-Of-N Computing For Fault Tolerant Processing In Mobile and...
Implementing K-Out-Of-N Computing For Fault Tolerant Processing In Mobile and...
 
IRJET- Resource Management in Mobile Cloud Computing: MSaaS & MPaaS with Femt...
IRJET- Resource Management in Mobile Cloud Computing: MSaaS & MPaaS with Femt...IRJET- Resource Management in Mobile Cloud Computing: MSaaS & MPaaS with Femt...
IRJET- Resource Management in Mobile Cloud Computing: MSaaS & MPaaS with Femt...
 
A Survey of Cyber foraging systems: Open Issues, Research Challenges
A Survey of Cyber foraging systems: Open Issues, Research ChallengesA Survey of Cyber foraging systems: Open Issues, Research Challenges
A Survey of Cyber foraging systems: Open Issues, Research Challenges
 
Finding your Way in the Fog: Towards a Comprehensive Definition of Fog Computing
Finding your Way in the Fog: Towards a Comprehensive Definition of Fog ComputingFinding your Way in the Fog: Towards a Comprehensive Definition of Fog Computing
Finding your Way in the Fog: Towards a Comprehensive Definition of Fog Computing
 
PERFORMANCE ANALYSIS OF MOBILE DATA OFFLOADING IN HETEROGENEOUS NETWORKS
 PERFORMANCE ANALYSIS OF MOBILE DATA OFFLOADING IN HETEROGENEOUS NETWORKS PERFORMANCE ANALYSIS OF MOBILE DATA OFFLOADING IN HETEROGENEOUS NETWORKS
PERFORMANCE ANALYSIS OF MOBILE DATA OFFLOADING IN HETEROGENEOUS NETWORKS
 
IRJET- Virtual Network Recognition and Optimization in SDN-Enabled Cloud Env...
IRJET-  Virtual Network Recognition and Optimization in SDN-Enabled Cloud Env...IRJET-  Virtual Network Recognition and Optimization in SDN-Enabled Cloud Env...
IRJET- Virtual Network Recognition and Optimization in SDN-Enabled Cloud Env...
 
Machine Learning 5G Federated Learning.pdf
Machine Learning 5G Federated Learning.pdfMachine Learning 5G Federated Learning.pdf
Machine Learning 5G Federated Learning.pdf
 
40120130405016
4012013040501640120130405016
40120130405016
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 
MOBILE CLOUD COMPUTING fundamental and basic
MOBILE CLOUD COMPUTING fundamental and basicMOBILE CLOUD COMPUTING fundamental and basic
MOBILE CLOUD COMPUTING fundamental and basic
 
Mobile cloud computing as future for mobile applications
Mobile cloud computing as future for mobile applicationsMobile cloud computing as future for mobile applications
Mobile cloud computing as future for mobile applications
 
Mobile Fog: A Programming Model for Large–Scale Applications on the Internet ...
Mobile Fog: A Programming Model for Large–Scale Applications on the Internet ...Mobile Fog: A Programming Model for Large–Scale Applications on the Internet ...
Mobile Fog: A Programming Model for Large–Scale Applications on the Internet ...
 
A Review On Wireless Grid Computing
A Review On Wireless Grid ComputingA Review On Wireless Grid Computing
A Review On Wireless Grid Computing
 
A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing
A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing
A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing
 
Cloud-Based Impact for Mobile and Pervasive Environments: A Survey
Cloud-Based Impact for Mobile and Pervasive Environments: A SurveyCloud-Based Impact for Mobile and Pervasive Environments: A Survey
Cloud-Based Impact for Mobile and Pervasive Environments: A Survey
 

Plus de eSAT Journals

Mechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavementsMechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavementseSAT Journals
 
Material management in construction – a case study
Material management in construction – a case studyMaterial management in construction – a case study
Material management in construction – a case studyeSAT Journals
 
Managing drought short term strategies in semi arid regions a case study
Managing drought    short term strategies in semi arid regions  a case studyManaging drought    short term strategies in semi arid regions  a case study
Managing drought short term strategies in semi arid regions a case studyeSAT Journals
 
Life cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangaloreLife cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangaloreeSAT Journals
 
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialsLaboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialseSAT Journals
 
Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...eSAT Journals
 
Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...eSAT Journals
 
Influence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizerInfluence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizereSAT Journals
 
Geographical information system (gis) for water resources management
Geographical information system (gis) for water resources managementGeographical information system (gis) for water resources management
Geographical information system (gis) for water resources managementeSAT Journals
 
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...eSAT Journals
 
Factors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concreteFactors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concreteeSAT Journals
 
Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...eSAT Journals
 
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...eSAT Journals
 
Evaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabsEvaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabseSAT Journals
 
Evaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in indiaEvaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in indiaeSAT Journals
 
Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...eSAT Journals
 
Estimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn methodEstimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn methodeSAT Journals
 
Estimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniquesEstimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniqueseSAT Journals
 
Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...eSAT Journals
 
Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...eSAT Journals
 

Plus de eSAT Journals (20)

Mechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavementsMechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavements
 
Material management in construction – a case study
Material management in construction – a case studyMaterial management in construction – a case study
Material management in construction – a case study
 
Managing drought short term strategies in semi arid regions a case study
Managing drought    short term strategies in semi arid regions  a case studyManaging drought    short term strategies in semi arid regions  a case study
Managing drought short term strategies in semi arid regions a case study
 
Life cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangaloreLife cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangalore
 
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialsLaboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
 
Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...
 
Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...
 
Influence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizerInfluence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizer
 
Geographical information system (gis) for water resources management
Geographical information system (gis) for water resources managementGeographical information system (gis) for water resources management
Geographical information system (gis) for water resources management
 
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
 
Factors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concreteFactors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concrete
 
Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...
 
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
 
Evaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabsEvaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabs
 
Evaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in indiaEvaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in india
 
Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...
 
Estimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn methodEstimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn method
 
Estimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniquesEstimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniques
 
Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...
 
Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...
 

Dernier

Indian Dairy Industry Present Status and.ppt
Indian Dairy Industry Present Status and.pptIndian Dairy Industry Present Status and.ppt
Indian Dairy Industry Present Status and.pptMadan Karki
 
Piping Basic stress analysis by engineering
Piping Basic stress analysis by engineeringPiping Basic stress analysis by engineering
Piping Basic stress analysis by engineeringJuanCarlosMorales19600
 
Earthing details of Electrical Substation
Earthing details of Electrical SubstationEarthing details of Electrical Substation
Earthing details of Electrical Substationstephanwindworld
 
lifi-technology with integration of IOT.pptx
lifi-technology with integration of IOT.pptxlifi-technology with integration of IOT.pptx
lifi-technology with integration of IOT.pptxsomshekarkn64
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...asadnawaz62
 
Solving The Right Triangles PowerPoint 2.ppt
Solving The Right Triangles PowerPoint 2.pptSolving The Right Triangles PowerPoint 2.ppt
Solving The Right Triangles PowerPoint 2.pptJasonTagapanGulla
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)dollysharma2066
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor CatchersTechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catcherssdickerson1
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
Correctly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleCorrectly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleAlluxio, Inc.
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfAsst.prof M.Gokilavani
 
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsyncWhy does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsyncssuser2ae721
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
8251 universal synchronous asynchronous receiver transmitter
8251 universal synchronous asynchronous receiver transmitter8251 universal synchronous asynchronous receiver transmitter
8251 universal synchronous asynchronous receiver transmitterShivangiSharma879191
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 

Dernier (20)

Indian Dairy Industry Present Status and.ppt
Indian Dairy Industry Present Status and.pptIndian Dairy Industry Present Status and.ppt
Indian Dairy Industry Present Status and.ppt
 
Piping Basic stress analysis by engineering
Piping Basic stress analysis by engineeringPiping Basic stress analysis by engineering
Piping Basic stress analysis by engineering
 
Earthing details of Electrical Substation
Earthing details of Electrical SubstationEarthing details of Electrical Substation
Earthing details of Electrical Substation
 
lifi-technology with integration of IOT.pptx
lifi-technology with integration of IOT.pptxlifi-technology with integration of IOT.pptx
lifi-technology with integration of IOT.pptx
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
 
Solving The Right Triangles PowerPoint 2.ppt
Solving The Right Triangles PowerPoint 2.pptSolving The Right Triangles PowerPoint 2.ppt
Solving The Right Triangles PowerPoint 2.ppt
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor CatchersTechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
Correctly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleCorrectly Loading Incremental Data at Scale
Correctly Loading Incremental Data at Scale
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
 
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsyncWhy does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
8251 universal synchronous asynchronous receiver transmitter
8251 universal synchronous asynchronous receiver transmitter8251 universal synchronous asynchronous receiver transmitter
8251 universal synchronous asynchronous receiver transmitter
 
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes  examplesPOWER SYSTEMS-1 Complete notes  examples
POWER SYSTEMS-1 Complete notes examples
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 

The common challenges of mobile internet for up coming generation

  • 1. IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163 __________________________________________________________________________________________ Volume: 01 Issue: 02 | Oct-2012, Available @ http://www.ijret.org 98 THE COMMON CHALLENGES OF MOBILE INTERNET FOR UP- COMING GENERATION A.Siles Balasingh 1 , N.Surenth 2 1,2 Lecturer, Department of Computer science and Engineering, St.Joseph University in Tanzania, East Africa singh_bala@yahoo.co.in, suren.zin1@gmail.com Abstract In this survey we concentrate on the mobile internet. Our main focus on mobile internet in two different cases of fixed connection which is provided by the telecommunication network provider and the second one is the wireless network which is getting from internet access point can be home network, Education campus .etc; in this case we also would like to discuss about network layer (protocols and Transport layer protocols). ----------------------------------------------------------------------***------------------------------------------------------------------------ INTRODUCTION There are lots of researches and modifications are going on to make shape the internet spans across the wide range on protocols, devices and standards to solve the existing problems and introducing new idea. Here we attempt to categorize some major challenges for themobile internet of upcoming generation, let‘s enter into a brief discussion on the recent advances and future directions. We have categorized the three- tire perspective. 1. The application perspective, which is very important on existing mobile applications and recent development applications. 2. The service Software perspective, which helps to run the applications with mobile operatingsystems. 3. The Protocols and Networks, which helps to grow the uniformity of internet speed from low speed to high speed in both wired to wireless network. MOBILE APPLICATION SOFT WARES A lot of existing and new applications in the market with sufficient for users but after investigating of all application are called context-ware applications, which take into account the position of the user her interest, and the capabilities of her mobile device. Some applications only used in common places and common for every one like ―face-book, Twitter‖, which can be called location-aware because the user can expose their ideas and other can view and response their opinion (Publically).There are some consumers are let through the shop by a mobile device attached to the shopping cart, these applications are built on top of WLAN/ Internet. Our team members has investigated the most of the applications are quite narrow and misunderstanding of the service offered. Especially in the face-book & Twitter services the users tried to set-up peer-to-peer [1,2]communication whereas the service offered was more like a public blackboard In recent approach was the integration of sensor networks [6] into the Internet. A dominant application here is the combination of body area networks and medical sensors; a very interesting field in which a lot of open questions concerning reliability, energy consumption, security and privacy have to be addressed. In order to simplify the development of the above Mentioned applications, new platforms are needed. The new platforms should carry an abstraction of the hybrid network and Non-uniform devices, in order to assist the application Programmers to not get swamped with all details. An issue here is to find the ‗golden rule‘ of the abstraction: it should also allow programmers to explicitly take into account the specific architecture of their networks, the constraints of their environments and the requirements of their applications. Such an engineering flexibility can be used to tune up applications according to their special needs. MOBILE MIDDLEWARE APPROACHES The development of distributed applications is a tedious task even in homogenous networks. However, in Non- uniform networks with a wide variety of devices, the complexity of future distributed applications may increase by several orders of magnitude. Existing middleware approaches such as CORBA, DCOM and Java RMI did not manage to meet the requirements for Developing context- aware services [4] in hybrid networks. They do not provide the technology to efficiently integrate networks, positioning systems, user and device profiles. That said, it should not be surprising that middleware platforms, which are tailored for the development of location-aware services, have attracted a lot of attention during the recent years. Some major issues such as adapting content to current location of and to the preferences of the users have been
  • 2. IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163 __________________________________________________________________________________________ Volume: 01 Issue: 02 | Oct-2012, Available @ http://www.ijret.org 99 investigated thoroughly. The same holds true for the adaptation of the presentation of this content to the capabilities of the actually used mobile device: Selection of content according to the current location and the interests of the user. In the approaches investigated in the selection of the content to be displayed on the mobile device is done according to the current position of the mobile. Here, the content is known beforehand and a mapping between the content and a certain position is provided by the service provider. The latter uses information retrieval services to get content based on the current location and user preferences, whereas the former uses metadata to compile content that corresponds to the user‘s current position. An advanced version of what can be done with user profiles is presented. The Shark approach allows information exchange between mobile devices, Based on the personal profiles of their users. Adapting content to the capabilities of the actually used mobile device. Authors describe architecture that allows protocols to adapt the presentation of given content to the capabilities, e.g. size of the display, of the device on which the content is going to be displayed. The content adaptation is realized using XML/XSL, I.e. the content itself is described using XML and its representation on a certain mobile device is defined in XSL. The aforementioned approaches focus primarily on how to enable application programmers to exploit the new features of the wired/wireless Internet [5]. However, they Ignore or at least neglect the different characteristics of the end devices and the reliability of the transport media in the fixed and the wireless part of the Internet. † In contrast to handheld devices, PCs and Workstations that are usually used in the fixed Internet have indeed sufficient resources, i.e. energy and processing power to run complex algorithms. The different capabilities of the end devices are very important with respect to security issues. On one hand in wireless networks eavesdropping is trivial due to the medium‘s ease of accessibility. On the other hand exhaustive use of security means, i.e. cipher mechanisms, is not possible due to the limited resources of the handheld devices. Here the user is always forced to decide between secure communication and convenience of his mobile device. † The deployment of wireless data networks has only extended partially the traditional Internet. For example, there are still places where connectivity cannot be guaranteed. This might be caused by the error rates of the wireless link, which are several orders of magnitude higher than the corresponding rates in wired networks, or by the fact that no access points or base stations are deployed in some regions. In parallel, the capabilities of mobile devices are increasing constantly. For example the ‗high-end-class‘ of mobile devices is equipped with processors that run at 400 MHz. Nevertheless, the question that calls for an urgent answer is what platform developers can do tounify the system behavior from the applicationperspective and to allow programmers to take advantage of specific performance improvements of the underlying technology. Such platforms, which are designed with the hybrid network and the high variety of devices in mind, are definitely needed. A vertical approach, that takes into account the limitations of the mobile devices, the special characteristics of the underlying networks and protocols as well as hardware/software co-design for platform components, will hopefully lead to better results. To justify the expectation, we can consider that up to now most middleware platforms did not differentiate between mobile devices during run time. They considered mobile devices to be thin or fat clients, but they did not provide means to configure the platform to the current needs of the mobile and its user. There is some work towards a more flexible approach, which allows to support disconnected operations [21] and to configure the platform in order to reduce power consumption [22].The better a platform can adapt to the measured network parameters, the better the application performance, and the longer the duty cycles of the mobile devices. Very interesting topics here are energy management and load balancing. Optimizing the energy consumption and optimizing the performance of the whole system are contradicting goals, at least in certain situations. Authors in Ref. [23] discuss an approach in which the security component of the platform enables mobile devices to shift the computational intensive operations of public key algorithms into the infrastructure. From the Viewpoint of each single mobile device this approach may be very appealing. But, the performance of the whole system may be degraded. The infrastructure servers are now taking an additional burden, which may, for example, increase their response times, etc. If the performance of the whole system is the major optimization goal, it might be desirable to shift Workload to the mobile devices. At least for the 400 MHz devices it seems feasible to run parts of the platform locally, e.g. the selection of content to the current location could be done at the mobile device. Flexible concepts that allow the realization of different optimization goals should be integrated into platforms within the next years. These concepts should enable application programmers and users to adapt the behavior of the platform to their needs. From the energy viewpoint it may be interesting to think about hardware/software co-design on the platform level. In the protocol area this is done quite successfully [24,25].In the middleware area the integration of energy awareness is rather new. The integration of hardware accelerators for cipher mechanisms into a location-aware middleware is discussed in Ref. [26]. The interesting point in this architecture is that the integration of the accelerators is completely transparent to applications and even to the platform. In Ref. [27] a broker-based approach towards an energy-aware middleware is presented. Here it is proposed to make operating system services energy-aware and to enable applications to monitor and control parameters such as voltage and task scheduling. Privacy is a crucial issue when it comes to the acceptance of new services. A significant proportion of the users of the fixed Internet are already concerned about their privacy [28,29]. By using mobile devices to access the Internet,
  • 3. IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163 __________________________________________________________________________________________ Volume: 01 Issue: 02 | Oct-2012, Available @ http://www.ijret.org 100 it becomes possible to connect the real- and cyber-world behavior of Internet users. So, privacy becomes more and more important. There are approaches [30–32] in which the user gets the possibility to decide how much information she is willing to reveal. In Ref. [33] the middleware intentionally reduces the accuracy of the position information. This helps to protect privacy but it cannot be used in systems that need an accurate position to work properly. Ensuring privacy can only be achieved by applying security mechanisms, i.e. authentication, authorization, de-/encryption and digital signatures. Especially the public key algorithms used for authentication and digital signatures are computationally expensive. So, here the limited resources of the wireless devices have to be taken into account. An open point still, is privacy enforcement, i.e. what can be done to ensure that service providers adhere to what they promise in accordance with their privacy policies. CONVERGENCEOFNON-UNIFORM COMMUNICATION CHANNELS There is a lot of ongoing research on issues of convergence of wired and wireless networks. The research spans across a variety of subtopics from the architectural aspects, which deal with the question ‗where is the right place to achieve convergence‘ to protocol design issues, which address the questions of best dealing with the assumptions of wired networks or even with issues of defining new metrics and methodologies for the evaluation of protocol behavior. In the architectural arena, the end-to-end argument was once again evaluated and criticized. The real issue here is to provide means that enable error detection and classification [34]. The informative source can be the local base station, the protocol sender, or even the protocol receiver. Given the nature of wireless networks, a local source may play a very informative role in the protocol engineering strategy and it may proxy the communication. The proxy can actually locally correct the detected problems, buffer un- acknowledged packets, preserve the transmission order, and leave the transport layer unchanged, at least theoretically Issues of concern here are plenty: Shall we add a burden to the base station for managing the inefficiencies of TCP? 910 P. Langendo¨rfer, V. Tsaousidis / Computer Communications 27 (2004) 908–913 shall we end up with sophisticated base stations instead of sophisticated transport protocols? Can we really resolve all the operational conflicts between TCP and local protocols, such as the timers? Can we expect that device heterogeneity—in terms of Functionality and sophistication—will eclipse in the near future? Since some level of heterogeneity in terms of protocol version or device functionality is inevitable, the real question here is whether it is more appropriate to deal with issues of heterogeneity at the proxy level or at the transport level. And finally and more generally, † when we detect an inefficiency at the transport protocol, such as TCP‘s inefficiency to detect the nature of the error (i.e. congestion or not), shall we change the network to deal with the problem or shall we change the protocol itself? The other category of proposals discusses modifications to existing protocols, esp. TCP. Some proposals deal with very specific problems, such as the handoff‘s impact on TCP‘s performance. A reasonable proposal here is TCP Freeze. However, there are several proposals that attempt to deal with a wider range of problems. For example, TCP- Probing deals with the error Classification prior to recovery and hence it targets efficiency beyond the handoff procedure. Similarly, TCP Real attempts to improve the impact of wireless errors on smoothness, competing with TCP-Westwood. The desirable behavior of TCP-Real is precisely to demonstrate efficiency in Non-uniform environments with wired or wireless networks and delay-sensitive or – tolerant applications. Receiver-oriented error control incarnates the property of the receiver to determine with better accuracy the data delivery rate and the potential level of data loss. This abrogates the impact of false assessments at the sender due to lost or delayed acknowledgements. TCP-Real estimates the level of contention allowing for early measures towards congestion avoidance, which, in turn, reduces the damaging transmission gaps. TCP-Westwood relies on bandwidth estimation to set the slow start threshold and the congestion window upon three duplicate acknowledgments or timeout. No specific mechanism exists to support error classification and the corresponding recovery tactics for wired/wireless networks, albeit the proposed mechanism appears to be relatively effective over symmetric wireless links due to its efficient congestion control. In summary, the framework for potential improvements is circumscribed by the application requirements and the Limitations of TCP‘s congestion control. We identify four distinct subtopics of protocol engineering related with the convergence of wired/wireless networks. Additive increase is not efficient when the network dynamics encompass rapid changes of bandwidth availability. For example, when short flows that cause congestion complete their task, bandwidth becomes available. Similarly, when a handoff is completed in a cellular network, the entire channel‘s bandwidth becomes available. Multiplicative decrease causes transmission gaps that hurt the performance of real-time applications that experience jitter and degraded good put. Furthermore, multiplicative decrease with a factor of 1/2 or a window adjustment to two packets characterizes a rather conservative strategy Note that multiplicative increase applies also in cases of wireless errors. Departing from AIMD show that, by removing a—what can be characterized as a minor technical flaw, both smoothness and responsiveness of the algorithm can be improved. Error detection lacks an appropriate classification module that would permit a responsive strategy, oriented by the nature of potential errors. That is, when errors appear to be transient due
  • 4. IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163 __________________________________________________________________________________________ Volume: 01 Issue: 02 | Oct-2012, Available @ http://www.ijret.org 101 to short-lived flows or random wireless interference, congestion control mechanisms (i.e. timeout extension and multiplicative window adjustment) are triggered unduly. The insufficient error detection/classification may also lead to unfair bandwidth allocation in mixed wired/wireless networks. By default, flows that experience wireless errors do not balance their bandwidth loss with a more aggressive recovery although such behavior could be justified: flows that experienced no losses have occupied extra bandwidth at the router temporarily, when the wireless errors forced some senders to back off. This situation is discussed as an open issue in Ref. [34]. Source-based decision on the transmission rate, based on the pace of the acknowledgements, necessarily incorporates the potentially asymmetric characteristics (e.g. ack delays and/or losses) of the reverse path, which is common in wireless and satellite networks. Hence, the sender‘s transmission rate does not always reflect the capacity of the forward path. This situation has a direct impact on efficiency since available bandwidth remains unexploited. In addition to the wired/wireless convergence, heterogeneity exists also at the level of bandwidth and capacity. Being designed with persistent congestion in mind, traditional TCP does not scale well to G-bit networks and beyond. Congestion itself exhibits different properties in such networks (i.e. more transient), the amount of transported data increases rapidly and consequently the amount of lost data can be in the order of hundreds or P. Langendo¨rfer, V. Tsaoussidis / Computer Communications 27 (2004) 908– 913 911 thousands of packets, the timeout and RTT-based transmission does not allow for efficient bandwidth exploitation, and the ack–clock limits further the transmission rate. Some mechanisms have been proposed to improve the performance of the protocol over high-speed links. Fast TCP attempts to predict the highest data at which data can be transmitted without losses. XCP appears to be a promising approach but requires router level assistance. AIMD-FC on the other hand, relies on‗fixing‘ the details of original AIMD in order for it to reach an equilibrium faster and achieve much higher efficiency. The above three approaches correspond to different fixes but they all improve the enhancements of TCP to allow communication at higher rates. We note that it is important to reach a standard that does not only allow TCP to work well in high-speed networks but also in low-speed ones. Else, the solution will not bridge the gap but instead, it may make it worse. New TCPs therefore, including Fast TCP, should be evaluated from this perspective as well. CONCLUSIONS There is a lot of research going on in different fields with the aim to diminish the differences between the wired and the wireless part of the Internet. People are looking at the limited resources of the wireless devices from the operating systems viewpoint, from the protocol viewpoint and from the middleware viewpoint. This clearly indicates that the integration of the mobile and the fixed Internet is a very complex task. In addition the question of how protocol and platform functionality is realized is crucial to what can be achieved. For example, the use of hardware accelerators helps to reduce the power consumption dramatically. The achievements so far are very promising. Despite the complexity of the task, there already applications available, which work well, even with the hybrid architecture of the Wireless Internet. We expect that the number of successful mobile applications will significantly increase as soon as handheld devices become more common and a better coverage with WLAN and 3G networks is provided. From the technical point of view, there are still several problems to be solved. On one hand, it appears a natural approach to isolate these problems and to try to tackle them independently; applying layer-specific methods. On the other hand, an integrated approach in which a problem is considered from a global perspective may lead to a better solution. There are several groups that follow this approach. In the end, both methodologies may provide complementary results. REFERENCES [1] J. Burrell, G.K. Gay, E-graffiti: evaluating real-world use of a contextaware system, Interacting with Computers (Special Issue on Universal Usability) 14 (4) (2002) 301–312. [2] W.G. Griswold, et al., Active Campus Sustaining Educational Communities through Mobile Technology, Technical Report #CS2002-0714, University of California, San Diego, 2002. [3] Metro Group, The Technical Concepts implemented at the Extra Future Store, available at: http://www.future- store.org/servlet/PB/show/1000815/pa-events-ecr-bookl- eng.pdf, last visited Dec. 2003 [4] L. Mehrmann, B. Kreller, Context-aware Community Applications For Mobile Youngsters, In: Proceedings of the First Mobile Communications Summit, 2001. [5] A. Luebke, From Internet in the car towards cars in the Internet,presentation at the DLR Workshop Quo Vadis Wireless Internet,2003, abstract available at: http://www.gzvb.de/informationssysteme/ abstracts/Luebke.html, last viewed December 2003. [6] M. Schuster, Body-Sensor Wireless Networks Monitoring Patients‘ Health with BAN, FOKUS-Fraunhofer Institute for Open Communication Systems Competence Center CATS, availableat http://www.fokus.fhg.de/medizin/download/BAN_E.pdf last visited Dec. 2003 [7] Object Management Group, The Common Object Request Broker: Architecture and Specification, revision 2.2, OMG Document Technical Report, 98-07-01, 1998. [8] Microsoft Corporation, DCOM Technical Overview, 1996, http://msdn.microsoft.com/library/default.asp?url ¼ /library/en-us/ dndcom/html/msdn_dcomtec.asp, last viewed September 24, 2003. [9] E. Pitt, K. McNiff, java.rmi: The Guide to Remote
  • 5. IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163 __________________________________________________________________________________________ Volume: 01 Issue: 02 | Oct-2012, Available @ http://www.ijret.org 102 Method Invocation, Addison-Wesley, Boston, 2001. [10] B. Keller, A.S. Park, J. Meggers, G. Forsgern, E. Kovacs, M. Rosinus, UMTS: a middleware architecture and mobile API approach, IEEE Personal Communications 5 (2) (1998) 32–38. [11] R. Jose´, A. Moreira, F. Meneses, G. Coulson, An Open Architecture for Developing Mobile Location-based Applications Over the Internet, Proceeding of the Sixth IEEE Symposium on Computers and Communications, 3–5 July, IEEE Computer Society, Los Alamitos, 2001, ISBN 0-7695-1177-5. [12] F. Hohl, U. Kubach, A. Leonhardi, M. Schwehm, K. Rothermel, Nexus: an open global infrastructure for spatial- aware applications, Proceedings of the Fifth International Conference on Mobile Computing and Networking (MobiCom 99), August 15–19, ACM Press, Seattle, Washington, USA, 1999. [13] A. Pashtan, R. Blattler, A. Heusser, P. Scheuermann, CATIS: A Context-Aware Tourist Information System, Poceedings of the Fourth International Workshop of Mobile Computing, June 17–18, Rostock, Germany, 2003. [14] A. Escudero, G.Q. Maguire, Role(s) of a proxy in location based services. PIMRC 2002, Thirteenth IEEE International Symposium on Personal, Indoor and Mobile Radio Communications. 16–18 September, Lisboa, Portugal, 2002. [15] condat AG: Skyware, available at http://www.condat.de/english/pdf/Skyware_eng.pdf,last visited Dec 2003 [16] H. Maab, Location-aware mobile applications based on directoryservices, MONET 3 (2) (1998) 157–173. [17] R. Kraemer, P. Schwander, Bluetooth based wireless internet applications for indoor hot spots: experience of a successful experiment during CeBit 2001, Computer Networks (2003). [18] P. Langendoerfer, O. Maye, Z. Dyka, R. Sorge, R. Winkler, R. Kraemer, in: Q. Mahmoud (Ed.), Middleware for Location-based Services: Design and Implementation Issues, Middleware for Communications, Wiley, New York, 2004. [19] St. Volz, J.-M. Bonfiger, Integration of Spatial Data within a Generic Platform for Location-Based Applications, In: Proceedings of the Joint International Symposium on Geospatial Theory, Processing and Applications, 2002.912 P. Langendo¨rfer, V. Tsaoussidis / Computer Communications 27 (2004) 908–913 [20] Th. Schwotzer, K. Geihs, Shark—a System for Management, Synchronization and Exchange of Knowledge in Mobile User Groups, Journal of Universal Computer Science 8 (6) (2002). [21] B. Wuest, O. Dro¨gehorn, K. David, FAME2: Software Architecture for B3G and 4G Networks, First Summit on Mobile and Wireless Communication, Aveiro, Portugal, 2003, pp. 837–841. [22] S. Mohapatra, N. Venkatasubramanian, PARM: Power Aware Reconfigurable Middleware, IEEE International Conference on Distributed Computer Systems (ICDCS-23), Rhode Island, May, 2003. [23] P. Langendo¨rfer, Z. Dyka, O. Maye, R. Kraemer, A Low Power Security Architecture for Mobile Commerce, Proceedings of the Fifth IEEE CAS Workshop on Wireless Communications and Networking (2002). [24] J. Riihijaervi, P. Maehoenen, M.J. Saaranen, J. Roivainen, J.-P. Soininen, Providing network connectivity for small appliances: a functionally minimized embedded web server, IEEE Communications Magazine October (2001). [25] E. Grass, et al., On the single-chip implementation of a Hiperlan/2 and IEEE 802.11a capable modem, IEEE Personal Communications Magazine December (2001). [26] P. Langendoerfer, Z. Dyka, F. Vater, O. Maye, Rolf Kraemer: A vertical approach towards energy-efficient application of cipher mechanisms in hot-spots running location-aware services, In: Proceedings of the International Conference on Advances in the Internet, Processing, Systems, and Interdisciplinary Research, 2003. [27] R. Cornea, et al., ServiceFORGE: A Software Architecture for Power and Quality Aware Services, Workshop at the International FME Symposium, September, 2003. [28] L.F. Cranor, Beyond Concern: Under-standing Net Users‘ Attitudes About Online Privacy, in: I. Vogelsang, B.M. Compaine (Eds.), The Internet Upheaval: Raising Questions, Seeking Answers in Communications Policy, The MIT Press, Cambridge, Massachusetts, 2000, pp. 47–70. [29] Jupiter Research: Consumers worried about online privacy, 2002 available at: http://www.nua.com/surveys/index.cgi?f ¼ VS&art_id ¼ 905358019&rel ¼ true; last visited Dec. 03 [30] P. Langendo¨rfer, R. Kraemer, Towards User Defined Privacy in location-aware Platforms, Proceeding of the Third International Conference on Internet Computing, CSREA Press, USA, 2002. [31] M. Bennicke, P. Langendo¨rfer, Towards Automatic Negotiation of Privacy Contracts for Internet Services, Proceeding of the 11th IEEE Conference on Networks (ICON 2003), IEEE Society Press, New York, 2003. [32] W. Wagealla, S. Terzis, C. English, Trust-based Model for Privacy Control in Context-aware Systems, Second Workshop on Security in Ubiquitous Computing, Ubicomp, 2003. [33] M. Gruteser, D. Grunwald, Anonymous Usage of Location- Based Services Through Spatial and Temporal Cloaking ACM/USENIX International Conference on Mobile Systems, Applications, and Services (MobiSys), 2003. [34] V. Tsaoussidis, I. Matta, Open issues on TCP for Mobile Computing, Journal of Wireless Communications and Mobile Computing (WCMC) 2 (1) (2002) 3–20. Wiley, New York. [35] H. Balakrishnan, S. Seshan, E. Amir, R.H. Katz, Improving TCP/IP Performance over Wireless Networks, In: Proceedings of ACM Mobicom ‗95, November, 1995
  • 6. IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163 __________________________________________________________________________________________ Volume: 01 Issue: 02 | Oct-2012, Available @ http://www.ijret.org 103 BIOGRAPHIES: A.Siles Balasingh .M.Tech (I.T) .He is currently working as Lecturer in Department of Computer Science and Engineering in St. Joseph College of Engineering and Technology, Dar Es Salaam, Tanzania, East Africa. He has 4 publications to his credit. He has guided more than 20 projects to final year B.E/B.Tech students with good industry and teaching experience. His areas of interest in Computer Networks, Computer Networks and security, Neural networks and sBioinformatics Computer Architecture and Ethical hacking. N.Surenth M.Tech (I.T) He is currently working as Lecturer in of Department in Computer Science and Engineering in St. Joseph College of Engineering and Technology, Dar Es Salaam, Tanzania, East Africa. He has guided more than 15 projects to final year B.E/B.Tech students and his area of interest in Computer Networks and Artificial Intelligence.