Sunteți pe pagina 1din 29

DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING

2 Marks 1. What is pervasive computing? Pervasive Computing is a technology that pervades the users environment by making use of multiple independent information devices (both fixed and mobile, homogeneous or heterogeneous) interconnected seamlessly through wireless or wired computer communication networks which are aimed to provide a class of computing / sensory / communication services to a class of users, preferably transparently and can provide personalized services while ensuring a fair degree of privacy / non intrusiveness. 2. What are the basic aspects or of a Pervasive Computing environment! "ultiple devices like car key, mobile phones, car audio system, and navigation system are integrated in the system# $ large number of different interfaces are used to build an optimized user interface# %here is a concurrent operation of offline, and temporary online systems# $ large number of specialized computer systems are interconnected via local buses and the internet# &hort range and wide area wireless communication are integrated# &ecurity element provides unauthorized access# 5. What are the components of pervasive computing? Components of 'nfrastructure for Pervasive Computing include "obile computing devices, (ixed computing devices, "ultimode )( "obile communication infrastructure <Fixed-to-Mobile and Mobile-to- Fixed communication system interfaces>, %rust system (security and privacy), Protocol stacks and Personalized service frameworks# 3. List the characteristics of a Pervasive Computing? Privacy * &ecurity +ffectiveness of $pproach $cross ,etworks +conomic considerations -uality considerations "onitoring mechanisms $daptability and (lexibility Practicability &ustainability 4. efine roaming environment? )oaming +nvironment. $n environment that allows connectivity and communication to the services outside the home zone is called a )oaming +nvironment# &ome sample devices that may involve )oaming based access /fixed / mobile roaming0. P1$s / Palmtops / Pocket PCs / Cell phones / &mart phones / 2$P phones 3

DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING


4aptops / %ablet PCs / ,otebook PCs 1esktop PCs / &ervers / 2eb %5s 6iosks 'nvisible computing devices / &mart interactive posters 2earable computers

!. List the issues invo"ve# in pervasive computing techno"og$? (eature specific issues (orm factor (size) specific issues Power provisioning issues 2eight specific issues &hape specific issues Cooling specific issues Connectivity specific issues 7ser 'nterface specific issues %. What are the ke$ parts of the har#&are of pervasive techno"ogies? Power provisioning technologies 1isplay technologies "emory technologies Communication technologies Processor technologies 'nterfacing technologies &ensor %echnologies $uthentication %echnologies '. efine Lo&(po&er evice )echno"ogies? &ince many of the devices involved in the pervasive computing environment may have to be small in size and may have to live on their battery / power units, consumption of lower power, extension of power provisioning period etc# assume critical significance# 'n addition, prevention from excessive heating also re8uires attention# Power re8uirements can be reduced by several means right from material selection and chip level designing to software designing and communication system designing# Power provisioning technology including the 9attery design technology plays a very important role in the process# *. List the ma+or #isp"a$ #evice techno"ogies in pervasive computing? Cathode )ay %ube based 1isplays (C)%s) 4i8uid Crystal 1isplays (4C1s) $ctive "atrix 1isplays %hin (ilm %ransistor 1isplays (%(%s) Passive "atrix displays &ingle &can 1isplays (Colour &uper %wist ,ematic. C&%,s) 1ual &can 1isplays (1ual &uper %wist ,ematic. 1&%,) :

DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING


;igh Performance $ddressing displays (;P$s) o 4ight +mitting 1iode based 1isplays (4+1s) o <rganic 4+1 based 1isplays (<4+1s) o 4ight +mitting Polymer based 1isplays (4+Ps) o Chip on =lass 1isplays (Co=s) o 4i8uid Crystal on =lass 1isplays (4Co=s) 1,. -o& #oes mobi"e internet protoco" overcome the a##ress prob"ems of .Pv4? %o overcome the address problems of 'Pv> for mobile nodes mobile 'P uses two 'P addresses. a fixed home address and care of address that changes at each new point of attachment# 11. What is P/LM 01? Palm <& is the computer operating system that provides a software platform for the Palm series of handheld personal digital assistants (P1$s) made by Palm 'nc# $ccording to Palm, Palm <& was designed from the beginning to fit into a palm size device of a specific size and with a specific display size# 12. 23p"ain brief"$ about 42 01# 9e<& is a powerful <& designed primarily for "ultimedia desktop use# <riginally 9e<& was designed for a custom computer system known as the 9e9ox that had special multimedia input/output features, and was later ported to the "acintosh, and finally ported to the PC# 13. List the characteristics of .r /. (re8uency band &ecurity %ransmitting capabilities 9andwidth &peech 14. What is the "atest techno"og$ emerge# in batteries? %he latest in battery technology is the emergence of lithium polymer cells, which use a gel material for the electrolyte# %he batteries are made from a few thin and flexible layers, and do not re8uire a leak proof casing# %his means the batteries can be made in any shape or size# 15. efine Crusoe processor. %he crusoe processor consists mostly of software# %he relatively small processor is designed as a 3:? bit very long instruction word processor capable of executing up to four operations per cycle# 1!. What #o $ou mean b$ 56ita"$7? %he fitaly keyboard arranges the letters based on their individual fre8uency and

DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING


the probability of transitions in the +nglish language# %he name is derived from the orders of letters in one of the top rows of the layout, Aust as the -2+)%B layout# 1%. What is meant b$ 4io(Metrics? 9iometrics is the science and technology of measuring and analyzing biological data# 'n information technology, biometrics refers to technologies that measure and analyze human body characteristics, such as 1,$, fingerprints, eye retinas and irises, voice patterns, facial patterns and hand measurements, for authentication purposes# 1'. What is a 50ctave7?. $nother approach to enter a text without real or on screen keyboard is used by octave from e acute# <ctave maps each letter of the alphabet to one of eight uni8ue strokes# %he strokes are based on a common characteristics part of the letters they represent and are located around the tips of a star shaped pattern# 1*. Cha""enges of #evice management in Pervasive Computing? 0r issues %racking the device location 1evice user relationship 5ersion control of devices and software that are out in the field &oftware updates of existing devices 'nstallation of new software on existing devices 2,. What are three steps invo"ve# in the process of 1$nchroni8ation? Pre synchronization &ynchronization Post synchronization# 21. What is meant b$ 2.59 techno"og$? :#C=, which stands for Dsecond and a half generation,D is a cellular wireless technology developed in between its predecessor, :=, and its successor, @=# 22. What are the 2 basic e"ements nee#e# &ith respect to connectivit$ in Pervasive Computing? %he pervasive computing system needs at least two basic elements to be pervading everywhere they are re8uired to pervade. Computing elements to take care of computational needs Communication elements to interconnect these computing elements either through wires or wirelessly (with / without mobility)# 23. What is a :-aptic .nterface;? ;aptics are enabled by actuators that apply forces to the skin for touch feedback, and controllers# %he actuator provides mechanical motion in response to an electrical stimulus# "ost early designs of haptic feedback use electromagnetic technologies such as vibratory motors, like a vibrating alert in a cell phone or a voice coil in a speaker, where a central mass is moved by an applied magnetic field# %hese electromagnetic motors

>

DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING


typically operate at resonance and provide strong feedback, but produce a limited range of sensations 24. escribe brief"$ about the tegic )* #ictionar$ mo#e "erit / &ignificance. )e8uires lesser number of keystrokes for textual input due to support for predictive text by combining use of dictionary and linguistic rules embedding, resolution of word ambiguity is supported through prompts, available in on screen as well as mechanical forms# 1emerit. )e8uires sizeable software support and computing resources (instruction cycles and memory)# 25. What are the ma+or choices avai"ab"e for batter$ #esign in Pervasive Computing evices? 6ey issue. &ize and weight of the batteries versus the power capacity and price 9ottleneck. )elatively slower advances in the battery technology compared to those in other fields like display and storage technologies Ma+or choices avai"ab"e . ,ickel Cadmium (,iCd. 3: :E hrs# standby time), ,ickel "etal ;ydride (,i";. 3F @E hrs# standby time), 4ithium 'on (4i ion.:3 CG hrs# standby time), 4ithium Polymer Cell based batteries (0 FG hrs# standby time, flexible shapes) etc 2!. <ame some app"ications of pervasive computing (i) )etail (ii) $irlines check in and booking (iii) &ales force automation (iv) ;ealth care (v) %racking (vi) Car information system (vii) +mail access via 2$P and voice 2%. -o& #oes the biometric authentication &ork in pervasive computing? %he method that work with small sensors can be used in pervasive computing space#finger print, speaker, signature can be used with pervasive# 9iometric authentication system captures the userHs characteristics with a sensor# %hey derive the features and compare with known reference# %he output is 9oolean# G 0$uthentication fails 3 0$uthentication succeeds 2'. What makes #evice connectivit$ possib"e in pervasive computing? $ user interacts with the computer, which can exist in many different forms laptop, tablets, terminals, phones, etc# %he underlying technologies to support ubi8uitous computing include 'nternet, advanced middleware, operating system, mobile code, sensors, microprocessors, new '/< (input / output), new user interfaces, networks, mobile protocols, location and positioning, new materials, etc

DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING


2*. 9ive the other terms of pervasive computing 7bi8uitous computing, calm technology 1! M/=>1 1. iscuss the app"ications of pervasive computing %here is lot of pervasive devices available on the market# %he 8uestion is how to use the device in application# %his section given the overview of what is possible and what is re8uired# %he areas include ?ii@ =etai" ?ii@ /ir"ines check in an# booking ?iii@ 1a"es force automation ?viii@ -ea"th care ?i3@ )racking ?3@ Car information s$stem ?3i@ 2mai" access via W/P an# voice =2)/.L 'n retail there is a need for faster and cheaper methods to bring goods to the consumer# ,ow Ia days the consumer can select large varieties of products and can buy from stores via 'nternet# "obile computers are provided with bar code readers, which are used to track product during manufacturing etc# &mall devices and wireless network access will be suitable for modern business# 2hen standardization of the device comes they will be cheap and more flexible# Consumers currently use computers to select products# 'n future they will use the P1$ and the pervasive devices in the domestic market# 2hen complete the list can be sent to the super market, and purchase in delivered to the consumer# %he advantage is 3# fast processing of data :# data mining can be done /ir"ine check in an# booking $irlines have been using the internet to publish flight schedules and customers check their flyer accounts and allow the travellers to buy the tickets directly# %his allows direct relationship between the customer airlines# 2hen the application is present on the internet only computer literate can access and the access is via pc# 2hen the airlines application is available on mobile computing the customers can interact with the airlines# 1a"es force automation "obile workers relied on their portable computers to access and process data on the road# $s we have wireless modems this has enabled tem to travel and still access the enterprises# $s we have potable devices with a simple interface and connectivity, F

DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING


they are easy to use, cheep and the organization can give more devices to more people# %hey can be used to access the organization critical data also# 9ut the problem is the rendering 8ualities limited by the device# -ea"th care %his is a crucial application where in new and complicated device is used only when they have a benefit to the patient# 1octors and others need to learn about the new methods and also to know to use the same# P1$ has been used in healthcare# %hey can integrate they can integrate into the hospital work and that of doctors routine# %hey can provide the latest patient data and information that took place a minute ago# %hese types of application are most sensitive# 'ntegrity must be assured# %he data should be exchanged only with restricted access# ;ealth care systems are now using smart cards for patients and professionals# %racking the use of bar codes has revolutionized the proJcess in many industries# %hey are found in almost all good and products# %he format is 3 1 bar code which encodes a few characters# %his is universal# %he other format available in : 1 barcode which alloJws several hundred of characters of information to be stored and will replace stamps in the futures 23A )adio fre8uency tags can be attached to goods such as labels# %hey will be read electronically even from large distance# %his )( tag has a clip and an antenna enclosed in a transparent plastic sheet less than an mm thick# %his can be used to track luggage in airlines industry# $s )( tag is cheap it can be attached to each luggage and can be detected at certain points oJn the Aourney# 'f any luggage gets separated from the passenger the airlines can immediately find out the current location of the luggage and do the necessary# Car information s$stem Car manufactures have started using pervasive coGmputin technology# Currently recent car have @G microprocessors on it# %hey can communicate among themselves# 'n future they can communicate to outside world# %o connect the car with outside world a gateway is needed# <&=i is the open service gateway initiative is and open standard and can communicate with outside world# %he ' version of <&=i based on Aava and Ainni technology# <&=i is the compatible with 9luetooth# ;ave home P,$, home )(, 7&9 and 2$P# 2mai" access via W/P an# voice %he most attractive application of mobile device is access email and calendars# ,ow many mobile users would like to access their email at any time and at any place# $ 2$P enabled mobile is well suited to access email fields and to send responses 2$P mail services must be tailored to small band width display and limited key 2$P mobiles phones access the internet of mobile email service provide via a 2$P gateway # "obile

DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING


email server hosts the applications# Creates 2"4 output and handles http re8uests this interfaces with pop @ mail server where the original email resides through a pop@ client# )he emai" session invo"ves the fo""o&ing steps 3# %he user can accesses a mobile email server using a 2$P profile and a start page 7)4# :# the mobile email server verifies whether the user is registered by checking the phone number and 7'1 and a password @# %he user re8uests email service and provides the pop@ password for the access the pop@ mail server# %he mobile email server verifies the address of the server and 7'1 in the user profile# ># %he server a accesses a pop@ mail server on behalf of the user and extracts the mail files for the user# $ mail lists is created converted to 2"4 and sent to the 2$P pone for users selection# C# %he user selects a mail file and sends a display re8uests to the mobile email server# F# the email server converts the email file to 2"4 and forward it to the 2$P phone for display E# %he user reads the email with a 2$P browser# ?# %he user responds with the re8uester for more mail or deletion of mail or reply# %o access via voice the same steps above is needed 7sers dial to the voice gateway authentication is done using customer id and pin# Pop@ passwords are stored on the mobile email server# 5oice xml data is transmitted to the vice gateway which hosts a voice browser and text to speech engine fGor text rendering# %he mobile email server must be a trusted component because it has access to passwords and user mail# "obile service providers may include the pop@ server and mobile email server together in their in their internet to avoid leak of passwords and sensitive mail# 2. 23p"ain #evice techno"ogies in pervasive computing %his section discusses the technology that influences the evolution of mobile device# %he key technologies are 1. -ar#&are techno"og$ 2. 1oft&are techno"ogies 3. 0perating s$stem an# +ava p"atform -ar#&areA 9atteries 1isplays "emory

$s the mobile devices are handy and small this imposes the size reduction in the hardware# %he size of the input and output component contribute to the total size of the mobile device# %oday both input and output components are integrated into the same ?

DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING


package result in smaller sized mobile phones# 9ut when the input and output are separated the size can be still reduce# (i#e#) display can be wrist watch etc# the alternative to key board should appear when size still needs to be reduced# 4atteriesA %he battery technology is developing at a slower rate when compared to other technologies# 2hen advances were made they were replaced because of their power consumption# (ew such technologies are <icke" ca#mium ce""A %his battery was used as rechargeable battery# ;eavy and loose their capacity through memory effect# %his is the older technology# <icke" meta" h$#ribe ?<iM-@ (3) 1elivers battery with better capacity# (:) 4ess weight# (@) ;as an environmentally friendly component# Lithium ion batter$ 7sed in all stets of electronic e8uipment# &till lighter when compared to others# 9etter energy density# "ore power delivery# Lithium po"$mer batter$ %his uses a gel material for electrolyte# %hese batteries are made@ from few thin layers of gel# %hey do not need any casing# ;ence the battery can be in any shape or size# isp"a$ 4C1 are replacing C)% used in the part# 1)< 1ual scan 1&%, is generally used in a P1$# %his method controls display element via passive matrix addressing# %his method consumes less power# ;as superior display performance hence used in laptop# Future technology <4+1. light emitting organic diode# 4+P. light emitting polymer technologies# 0L2

DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING


<rganic compound are used as semi conductor material# &election of organic compounds made such displays as extremely thin and flexible# C09 chip on glass 4C<=. chip on glass# 4C<=. li8uid crystal on glass# %hese integrate the pixels on the transmitter present on the layer of glass# %hey can used to manufacture extremely small displays where the pixels size is only 3G Km# &uch are used with wearable computers Memor$ "emory is becoming cheaper at the same time the demand from the application is increasing# %he current trend in that it is possible to integrate several "9 of memory into mobile services# 1torage of #ata 2hen permanent data is to be stored removable disk drives with 3 =9 is available to store# Techni ues follo!ed in smart phones and "#$ %hey store <#& code and application data in non volatile flash memory and battery backed )$"# %hey are based on semi conductor technology# ;ence they need less power and provide faster access# %he capacity is from : to 3F "9# +xpansion slots are available additional to be plugged in# (lash memory and static )$" can be used, fre8uently changed data is kept in &)$"# %omparison of &'#M and $'#M (dynamic ram) 3# &imple addressing scheme vice versa for 1)$"# :# 4ack refresh cycle# Future technologies (ni transistor '#M 3# Combines both &)$" and 1)$"# :# ;ence higher capacity on smaller chips# M'#M "agnetio resivitive )$"# F'#M ferro electric )$"# "rocessers 3# 1ue to improvement in the C"<& technology the smaller sized processors are delivered and higher number of transistors are integereted in a single chip#

3G

DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING


:# %he clock rate and the processing power availability has been increased steadily# @# %he low heat emission due to the core voltage# -uman(machine interface ?1oft&are techno"ogies@ ,avigation ;aptic interface 6eyboards ;andwriting recognition &peech recognition

"obile devices use keyboard and displays to interface with the users# %hey are much smaller and specialized for the application and the form factor of particular devices# +x. 3# &ome mobile devices have only number keys and few extra keys for built in menu :# &ome devices limit the number of mechanical keys to absolute minimum which is used to trigger the important application for navigation# @# %here are devices that have no display or keyboard# &uch devices are called headless devices# <avigationA %o operate application in mobile de@vices the user navigates through menu structure# )xample %he integrated cursor key which delivers signal for all four directions by pressing or moving# 9uttons can be operated withy thumb# %he buttons can be turned vor pressed# (or each step in one direction the menu navigator selects and highlights one of the entries# %he entry is selected by pressing the buttons# -aptic interfaceA %he aptic interface is basically a rotating control control with force feedback and a push button integrated into one >e$boar#sA %ypes. <nscreen keyboard (italy %egie %J <ctave -an#&riting recognitionA 2ord recognition Character recognition 33

DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING


4ocalization 1peech recognitionA %his is the most natural input method 3. iscuss biometrics concept $ccess to system must be secured against unauthorized use# 7ser authentication is a key function# Classical authentication relives on what you are and what you know# 'nternet application relies on 7'1 and password# ;ow ever password can be stolen by (3) 2atching the user entering the password (:) 1uring transmission# (@) 5ia access to system admin data# %he stolen password is hard to detect because nothing is removed# =&" phones are protected against unauthorized use through the &'" and P', chosen by the customer# %he P', is stored and checked in the secure environment of the &'" and is not transmitted# 'ntruder must steal the &'" and P', to impersonify# "any users do not prefer P', because when forgotten and needs a complex procedure# %o overcome such we use biometric authentication# %hese methods relay on what you are# (e#g#) finger print, signature, hand geometry, face recognition, iris scan# %he method that work with small sensors can be used in pervasive computing space# (inger print, speaker, signature can be used with pervasive# 9iometric authentication system captures the userHs characteristics with a sensor# %hey derive the features and compare with known reference# %he output is 9oolean# G 0$uthentication fails 3 0$uthentication succeeds =eneration of reference values and actual value is subAect to distortion# %he comparison of the data sets is complex and introduction additional errors# %here is always higher chance that biometric authentication will fail# 6/=A (alse $cceptance )ate is defined as the probability that the system will accept a wrong user# 6==A (alse )eAection )ate is defined as the probability that the system will reAect a correct user# (or &'" with P', the (ar LG#G3M 3:

DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING


()) LGM

(3)2hen biometric system is tuned to achieve small ($), it increases ()) and service will be banned# 1<& is acceptable if a reasonable exception path exists# (:)9iometric system has semantic problems (eg) service may be denied if finger is dirty or inAured# (@) ;ence biometric application is limited to application where ade8uate back up is present incase of 1<&# (>)&usceptible to fraud unless the total system is securely encapsulated and communicates via secure channel# Penbased device may use signature to verify and to secure access to device (or signature ($) ()) LG#3M LCM

%he system is prone to tampering because none of the systems are encapsulated in a secure housing# 4. 23p"ain 01 concepts in pervasive computing Palm <s +P<C 2indows C+ -,N ,eutrino 9e<& +mbedded 4',7N

%he core function of the pervasive device is determined by its operating system# %he maAor difference of operating system for pervasive devices from the userHs point of view# (3) ;uman machine interface (:) &peed# %he pervasive operating system the basic concepts of operating system# T*+ T'),$& F+' ")'-#&.-) %+M"(T.,/ +")'#T.,/ &0&T)M (3) Personal use. Palm <& and windows C+# (:) (or home use. 4inux, 9e<& PALM OS: "ost successful <& for P1$# $vailable with &ony, '9"# &uccess is because it is designed specifically for P1$#;ence 6nown as Oen of P1$#

3@

DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING


&upplies only limited features# 1ue to the limited feature leads to lower memory and cpu usage# ;ence longer battery life# 'mplemented on 3F bit "otorola 1ragon 9all cpu# Current version is >#G# &upports 9luetooth and FC,C@F different colours# %his will lead to multimedia P1$ integrated with mobile phones# <& (7,%'<,$4'%B. Palm <& is a layered architecture# 't has different horizontal and vertical layers# %he micro 6ernel encapsulates the hardware specified functionality# ;ence the vertical layer are independent of the hardware# %he vertical layer provide $P' for the applications to access the <&# %hey are (3)7ser interface. =raphical input/output# (:)"emory management. 1atabase, space, runtime system, variables# (+$%7)+& <( P$4" <&.

User management. Task management. Power management. OS Size. User interface.

EPOC:
+P<C was created by psion maintained by &ymbian# %here are : versions# +P<C 3F and +P<C @: for 3F and @: bit processors respectively# %he current version of +P<C is release C which is available for 3F bit and @: bit processors# +P<C supports 7nicode and can display :CF colours# Core operating s$stemA +P<C is multitasking# %he <& architecture is represented by the figure# %he base layer provides the fundamental $P'# %he middleware layer provides the component needed to support =7' and application# +'6<, is the system =7' frame work# (inal layer is the applications# 0perating s$stem featuresA (3) 7ser management# (:) %ask management# (@) 7ser interface# (>) "emory management# Win#o&s C2A %his is an embedded <#& developed by "icrosoft# 2indows C+ user interface is similar to that of windows user interface# %he current version is @#G# 2indows C+ is 3>

DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING


available for @: bit processors# (e#g#) N?F,$)", power PC and "'Ps of @: bit processors# @#G offers a real time support, a smart card subsystem for PC/&C complaint readers windows C+ is 7nicode based and support gray scale and colour up to @: bit# 6eatures of &in#o&s C2 A (3) 7ser management# (:) %ask management# (@) <perating system size# (>) 7ser interface# (C) "emory management# (F) security# (E) software development for windows C+ B<C <eutrinoA %he current version of -,N ,eutrino is :#3# %his is a real time operating system and has micro 6ernel surrounded by a collection of optional processes that provides P<&'N and 7,'N compatible system services# Core operating s$stem functiona"it$A %he core operating system consists of a micro 6ernel which has a size of 3:69 %he 6ernel provides > services (3) 'PC (:) Process scheduling (@) 4ow level network communication# (>) 'nterrupt dispatching 6eaturesA (3) 7ser management# (:) %ask management (@) 7ser interface (>) "emory management (C) $ddon features (F) &oftware development 4e01A %he goal was to create a media operating system# %he current version is C# 't offers multiprocessor or support to integrate sound and graphic, processors, F> bit file system to deal with huge amount of data# 9e<& can be used for internet personal access device provides the multimedia foundation# 62/)D=21 of 4e01A (3) 7ser management#

3C

DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING


(:) (@) (>) (C) %ask management "emory management $ddon features &oftware development for 9e<&#

2mbe##e# L.<DCA %his is a stripped down 4',7N <#& with support to pervasive devices# %here is no standard for embedded 4',7N# %here is a consortium which promotes embedded 4',7N systems# 7sed in "'Ps, $)", "otorola, 'ntel processor# Core operating s$stem functiona"it$A Configurable 6ernel &calability ,etworking 0P2=/).<9 1E1)2M 62/)D=21A (3) 7ser management# (:) %ask management (@) <perating system size (>) 7ser interface (C) "emory management 5. 9ive the overvie& of #evice connectivit$ Protoco"s 2ireless protocols 2$P/2"4 <9+N (9luetooth) "obile phone technology "obile internet protocol &ynchronization * transaction based protocols 1istributed services "essage * transaction based protocols 1ecurit$ Concepts 1evice security &erver side security Cryptographic algorithms evice management 1evice management challenges &oftware distribution $pproaches

3F

DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING


!. iscuss the concepts of securit$ F #evice management in pervasive computing 1ecurit$ %his section discusses with the basic security concepts and tells about how they can be implemented# )he concepts are 3# 'dentifications :# authentications @# authorizations ># transactions C# non repudiations .#entifications %he identifications is needed to identify the users accessing the accessing the server using pervasive devices# %he common method is to use user identifications which can be entered or stored in the device# 'f the user has a mobile phone we can use the phone number# 'f the user ahs certificate then the certificate uni8ue id can be used# %hese ids must be mapped to userHs id# /uthenticationA $uthenticatiGon is toJ prove that who the individuals say they are %he most common authentication is user id and password $uthentication can also be done by sim# %he authentication is executed between the smart card on the client and the authentication software on the server side# Password provided by the user has to be given to smart card before a signature can be obtained to ensure authentication# /uthori8ation $uthorization is to define principals and associate permissions that these principals possess# $uthorization should depend on the device and authentication transaction# 3 #%ransaction authorization :# 1igital signature endorsed by a password @# %ransaction authorization numbers <on repu#iation 3E

DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING

%he user cannot falsely deny later that the user has authorized a transaction 1igital signature can be used to prevent repudiation# P 1evice security P 2$P phones evice managementA ;ere we discuss about the maAor challenges of devices management example of device management software distribution and approaches to solve the device management Challenges of device management )he serious cha""enges pose# are 3# tracking device location :# device user relation ship @# version control of device and software ># software updates of existing devices C# installation of new software on existing devices F# providing secure access to device information /pproaches 3# hardware capabilities :# hardware and software version management @# library management ># device are not always connected / unstable connection C# insecure connection !. 23p"ain pervasive &eb app"ication architecture %he architecture proposed for pervasive computing application support multiple devices like pl 2$P P1$ etc voice only enabled phones access the web server through voice gate way # )he prob"ems inc"u#e 3# 5ariety of 1evice :# "ark up languages @# $uthentication method %he challenges faced are many# (or example users may have different devices that appear and behave differently# ;ence applications that support pervasive computing should adapt to the device that are used hence application must provide content in a form that is appropriate for userHs specific device# 'f the device capabilities differ, the interaction between the user and the web application has to be tailored to that of the device capabilities to provide good usage# 3?

DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING

-ence architecture shou"# 3# (ilter unnecessaryQ information :# flexible to adapt to different user devices# @# $dapt to scalability ># &atisfy performance 1ca"abi"it$ an# avai"abi"it$ &calability and availability are maAor issues that should be catered in pervasive computing application /vai"abi"it$ %he services should be available at all times when they need it they assume that it does not work and switch to another service provider# eve"opment team nee#e# to #eve"op pervasive computing &eb app"ication %he team needed has 3# business logic designers :# user interface designers @# application programmer ># experts Pervasive app"ication architecture Pervasive computing application has another complexity i#e# devices are different from each other# %here cannot be a command controller that will fit in all devices# %o support multi controllers the server will be a dispatcher to invoke the appropriate controller based up on the device# ;ence to avoid duplication of code for invoking a model function between controllers we use a command pattern Comman# Command is a bean with input and output properties# 1ecuring pervasive computing app"ication 2eb applications supporting pervasive devices should be secure by having encryption authentication and authorization# %he architecture processes the client re8uest on the application server securely# 3J

DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING


%he process of security addresses 7'1 authentication and authorization $ll incoming re8uests are form the device connectivity infra structure# the infra structure include the different kinds of gateway that convert device specific re8uests to a http re8uest which carries information about device type desired language desired reply content type# +xamples of gateway are 3# voice gateways :# 2$P gateways @# gateways for connecting P1$ 1ecuring pervasive app"ication using an authentication pro3$ %o have an secure pervasive computing application an authentication proxy along with security policyQ engine can be used )he #evice can be connecte# 3# directly to the authentication proxy :# via an appropriate gateway /#vantages of centra"i8e# authentication %he acce@ss rights are managed at a central place a such that the application servers are not overloaded the interaction can be either for the first time or subse8uent time /#vantages of authentication pro3$ 3# $uthentication can be performed in a militarized zone# :# through the outer fire wall re8uests can flow only to the proxy @# the inner fire wall re8uests can flow only to the application servers that come from proxy 1ecuring pervasive app"ication using a frame &ork ;ere we discuss how a frame work can be sued to support secure pervasive application /ssumption 3# "5C pattern :# R&P application logic patter Web app"ication ba#e on MGC pattern H1P base# app"ication 1ecure serv"et &ecure servlet inherits form http servlet overwriting the service method

:G

DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING


%he service method of the secure servlet uses the security polity class to perform the security check# %he secure servlet class implants > methods that provided the information needed by security policy as a basis for decision 3# get action method :# get authentication method @# get device type method ># get role method 1ecure H1P 1ecurit$ state 1ecurit$ po"ic$ %. -o& computing access from PC1 an# P /? Ismart(car# base# authentication ;ere we discuss how the users connect to the internet via P1$ personal digital assistants# %here are approaches on how the users connect to the internet via P1$ 3# &ynchronize the menu to the P1$# :# 7se a local data base and native application to handle the menu# %he user will be connected only when synchronizing the data and submitting a re8uest# @# 2$P is used to show the actual menu#%he user will be connected while browsing the menu and submitting a re8uest# /ccess from PC J 1mart J car# base# authentication through .nternet 'n this case, we shall use smart card authentication with a public key# Customers are provided with a smart card with an inbuilt chip# %he card contains the following. 3# Private key for generating digital signatures :# Certificate containing data about the customer @# Public key associated with the private key of the customer ># &ignature for all these data iagram J =efer book .mp"ementation is for s$nchroni8e# #evicesA )00LA %he tools used are i&ilo and i&ilo web# /pp"ication esignA %he user installs the i&ilo web application on the pc and i&iloclient application on the P1$# %he new channel has to be configured has once which is used to update the data from

:3

DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING


the web shop when ever needed# 2hen the P1$ is connected to the networked pc the ;%"4 page are transferred to the pc and converted to the internal i&ilo format# %hey are synchronized to the P1$ in asinle file then onwards the pc and the network connection are not needed any more# %he user can access the page through the i&ilo client application M2<D 1)=DC)D=2. %his model follows the ;%"4 version of the menu# %his implementation is designed for the users who do not want to connect to the web shop fre8uently and want to keep the product list on their device for reference only# ;ere no personal data is stored and no registration is need# 1ue to the small display on P1$, the items need to be categorized# %o keep a small page size the present in a separate page which can be reached through hyperlink# /)/A %here are page for connecting the P1$ to server# %he pages are in ;%"4 format but limited tags are used and image size in small# %hey can be viewed by standard browsers# 2eb shop server detects the desired mark up format for use on a P1$ looking at the user agent string# ;ere we should have installed the i&ilo client application on the mobile device# %he page are received and downloaded to the P1$ using a networked pc running the isilo web tool# %his tool allow the channel to be defined which represent a collection of pages from local file or web# %he user need to configure the channel with the 7)4 and select the option for conversion to the i&ilo format# %he page are load from the web, converted to the internal, compressed isilo format# 1uring the next local synchronization they will be copied to the userSs palm <& device# <nce transferred then the P1$ can be disconnected from the network can be browsed through i&ilo client application# )-2 L00> /< 622L. %he ;%"4 page when looked on the P1$ screen will look different#%hey lack colour and rendering is different P1$ cannot handle tables,hence they place each table cell on a separate line# .MPL2M2<)/).0<A %he menu is created using standard ;%"4#scaled down images are embedded on the top of the page#%he table is displayed without border,all the element on the page are centered# 'nstead of using static ;%"4 code web shop uses servlets,R&P to genetate the mark up. C0<CLD).0<A %here is no interaction between the mobile device and the web shop once the menu has been downloaded# %he user can use the hypertext document to browse through

::

DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING


the menu, when an order is clicked in the web shop the application runs completely disconnected# / G/<)/92A 3#&o simple,every uses with i&ilo tool can get the menu from web shop# :#%he user does not need an online connection# @#%hey can access the data at any time without network delays# .1/ G/<)/92A 3#%he data is present in out dated# :#%he user need to update the channel from time to time#%hey will not receive menu updates#%his is a significant problem for a web shop# .MPL2M2<)/).0< 60= .<)2=M.))2<)LE C0<<2C)2 2G.C2A %he second implementation of P1$ ccess to web shop allows the user to download the menu to the mobile device which can be used for reference when postioning an order#;ere new order are transmitted directly from P1$ to webshop and during the synchronization the P1$ date base is updated# )00L1 D12 A %wo important component are needed for this approach# 3#%her heeds to be a synchronizeation mechanism# :#%he database engine for the P1$# (or synchronization we use '9" mobile connect synchronization server#%o have a database engine we can use '9" 19:#or <rcale etc# %he tool used will be metro work code warrior# /PPL.C/).0< 21.9<A %he P1$ connect to synchronization sever via a modem#%he synchronization server access the )19 is a base server#'t processes the updata between the prouct list stored on the server and the local copy on the client#'t supports to handle update etc#, M2<D 1)=DC)D=2A %his method proper users authentication#$ll personal data are kept confidential#,o login are needed because synchronization server perform user authentication# )-2 /)/A %he prodect data are stored in )19 accessed by synchronization server# )-2 L00> /< 622LA $fter the user has configured the mobile connect client application with the synchronization server address the user connects the database is replicated to the device for the following connects only the name currently connected is sent to device#5ia this application knows who the currenent user is#9ut %here is no P' to 8uery or modify synchronization server settings#

:@

DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING


C0<CLD1.0<1A 3#%her is way to update the data from web shop, when ever customer connects to the synchronization server# :#%he application does not need a permanent network connection# @#%his approach allows the highest degree of customization# .1/ G/<)/92A 3#,eed a special application fro each P1$ we want to support .MPL2M2<)/).0< 60= C0<<2C)2 2G.C2A %he goal of this is to give the most up to data view of the menu available and to make it as device independent as possible# 9ut compromise has to be done on user interface# )00L1A k9rowser /PPL.C/).0< 21.9<. %his shows hoe the P1$ connects to the web shop server and receives back 2"4 pages# $ modem with infra red beam is used to connects to a 2$P gateway which handles the conversion between ;%%P and 2$P# $ll web pages are available from the web server in 2"4 format and all images are encoded in the 29"P format# %he web server connects to the product database and renders data using R&P# M2<D 1)=DC)D=2A %he menu struEcture is similer to pc version since both use a browser to access the webshop# $fter the initial login the complete menu can be displayed# P1$ offers easy way to enter text, the 7'1 and password can be alpha numeric# %he shop is categorized hence avoids scroll through long lists# )-2 L00> /< )-2 622LA %he appearance of 2"4 based is same as that of 2$P# %he graphics and lay out are adapted to that ofP1$# %he screen resolution in front 3FGP3FG to F>GP:>G pixels# $fter log in the main menu is presented to the user# %he favorites are immediately available# %he items are categorized# .MPL2M2<)/).0<A 2eb server has to prepared to deliver 2"4# 't can detect the browser user by checking the user agent straight that is part of each ;%%P re8uest# 'f it detects that a 2"4 browser is used the server will switch from ;%"4 to 2"4 by calling appropriate R&P# %o test the 2"4 pages and to convert the graphics we use ,okia 2$P tool kit# $ll graphics have to be converted into 2$P specified 2+"P format# :>

DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING


/ G/<)/92. ,o internal database is re8uied on P1$ because all data remain in the server# <rders are compiled and handled while connected to the server# %he latest data will be always available# .1/ G/<)/92A %here is no way to check history or status when offline# %o decrease the comlexity (i#e) the number of format tools# 2e should use ;%"4 but this needs ;%"4 capable browser# 'f the browser supports only a subset of ;%"4 it will still need web server to handle access via P1$ separately by generating an appropriate ;%"4 subset, and a layout for the P1$ screens# '. -o& computing access from W/P? ;ere we discuss how the application is made to access 2$P browser using mobile device# W/P 6unctiona"it$ &imple interactions with the service the internet can be done using 2$P device# $s an example we study automated S7ncle +nzoHs pizza hut server# %he advantage of such device is that the boot time is short and can be placed in pockets and can able to place order with 7ncle +nzoHs shop# (rom this organization point view the advantage is that the organization need not the recruit additional personal for process# %o access via 2$P device the application must be optimized for usability and efficient user interface# $s the display is small it is difficult to display the full list of menu items# ;ence only a short list of menu items can be displayed# %hey do the process called 8uick where by the customer has to customize the favourites if not it is at the recommendation of the chef# %o list out the favourites the customer need to use the PC browser# %he other administration function can be accessed via pc only# (or example when we consider the function website of 7ncle +nzoHs shop only the highlighted ones are displayed in the 2$P client# 2hen the the customer navigates to the shop website via 2$P device only a few function appears# (i#e) 4ogo,login,authentication is done via P',,menu,8uick addressing and confirmation is displayed# :C

DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING


%he other functioin gets displayed only when accessed via pc# 2$P interface should integrate with the overall architecture#%he limited subset of function is provided in 2$P device# %he figure shows the servlets constituting the overall architecture of the organization#%hree servlets constitute entire system architecture viz registration,login, shop# %o this we have the controller then the exact function# .nfra 1tructure 'n addition to the internet infra structure needed to deploy the web application, the device needs 2$P geteway and a dial in hardware# %o have the 2$P connectivity there are two choices for the business (i) &etup their own e8uipment for 2$P connectivity# (ii) )elay upon the services provided by the network operators# ;ere the service provider the re8uirement is that the phones are to be configured to access their gateways# 2hen the organization wants to deploy the application 8uickly the decision is to rely upon the gateway provided by providers# ;ere no special e8uipment is needed when choice : is opted# )e8uest from 2$P Phones move to 2$P gateway of the service provider# %hey are converted to ;%%P re8uest which flows to application server# %he software present in the application server detects that the re8uest is from 2$P phone and return ;%%P response with appropriate document type and content to 2$P gateway at the network provider# (inally the 2$P gateway converts the response to a 2$P response and send back to the device# )-2 )00L1 <22 2 60= .mp"ementation 2"4 is supported todayHs mobile phone is a language based on N"4# 2"4 can be edited using N"4 editors or 2"4 editors are provided with 2$P tools kits# 2$P application tool kit can be used to convert images to the 29"P format needed by 2$P phones# %o create a complex 2"4 pages it is convenient to create an initial version of the 2"4 pages using a 2$P tool kit# 2hen the 2"4 pages have been created tools are needed to deploy and test them# $fter deployment the 2$P emulator is connected to application server to test the application# %he 2$P tool kit have the capability to display 2"4 source for any deck received from the application# %his indicate the errors which is helpful for debugging# $t the last only 2$P application are tested on real phones# (or usability task the test are conducted on individual targets devices#

23tension to improve the spee# usabi"it$


/uthentication mechanism :F

DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING

%he application uses s '1 and a numerical password for authentication# %his has the advantage because it can work on any phone# 9ut from the user point of view it is inconvenient# %he alternatives to this approach are Customer . using M.1.1 < numbers. "'&'&1, is a number to identify the device# ;ence this is a uni8ue number# %his "'&'&1, can be considered as a password# %he 7'1 will be the telephone number# 2hen logged in via mobile phone number this redirects to the shop to find the e8uivalent "'&'&1, number# Customer authentication using W.M 2'" allows secure authentication via internet# 1uring registration the user will have to registrator a 2$P certificate with the shop which gives the shop a mapping of certification to user '1 number# 2hen a customer with a 2'" enabled phone logs onto the shop may send a 2"4 page, 2"4 script generates a signature over a random challenge from the server using appropriate private key export the certificate for the key and signature and 2$P certificate back to server for authentication# Mu"tipart responses "ultipart response allows server to chain files and return to the client in one response# /#vantageA )educe the number of re8uest from the mobile device to the server# .nput va"i#ation using WML script $pplication needs inputs to be validated# 2"4 scripts can be used to validate user input on the 2$P device to reduce the number of transactions#

:E

DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING

/nna universit$ Buestion papers


4.2I4.)ech. 29=22 2C/M.</).0<K M/EIHD<2 2,13 Part $ 3# 1efine 9iometrics (Page : 4) :# ,ame some applications of pervasive computing (Page : 5) Part 9 3# ;ow is server side security done in pervasive computing! +xplain in it detail (Page :
16)

:# 2rite down the functionality of 2$P in access via 2$P (Page : 24) 4.2I4.)ech. 29=22 2C/M.</).0<K M/EIHD<2 2,13 Part $ 3# 2hat are the key parts of the hardware of pervasive technologies! (Page : 2) :# ;ow does the biometric authentication work in pervasive computing! (Page : 5) Part 9 3# ;ow is security in pervasive computing established! +xplain them in detail (Page : 16) :# 2rite short notes on the smart card based authentication via the internet (Page : 21) 4.2I4.)ech. 29=22 2C/M.</).0<K M/EIHD<2 2,12 Part $ 3# 2hat is meant by pervasive computing! ;ow is it done! ?Page A 1@ :# 2hat makes device connectivity possible in pervasive computing! (Page A 5@ Part 9 3# (i) +xplain the operating system issues related to miniature devices# ?Page A 13@ (ii)2hat are the design and implementation issues in device connectivity aspect of pervasive computing! +xplain# ?Page A 1!@ :#+xplain the various soft surface and semi soft surface based based display systems and technologies# ?Page A *@ 4.2I4.)ech. 29=22 2C/M.</).0<K M/EIHD<2 2,12 Part $ :?

DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING


3# =ive the other terms of pervasive computing ?Page A 5 F 1@ :# ;ow biometric signals are used in pervasive computing! ?Page A 5@ Part 9 3# 1iscuss the various issues and challenges for interfacing the human machine in pervasive computing# ?Page A 11@ :# 1escribe the various problems for security and device management in pervasive computing# ?Page A 1!@ 4.2I4.)ech. 29=22 2C/M.</).0<K M/EIHD<2 2,11 Part $ 3# 2hat is Pervasive Computing! ?Page A 1@ :# 2hat are the various issues related to device management in pervasive computing! (Page
: 4)

Part 9 3#(i) 1escribe the various hardware components involved in pervasive computing devices# ?Page A '@ (ii) +xplain how a pervasive web application can be secured using an S$uthentication ProxyH ?Page A 1%@ :(i) 2hat are the applications of pervasive computing! 1iscuss any two of them# ?PageA!@ (ii) +xplain how pervasive web application can be accessed via 2$P# ?Page A 25@

:J

S-ar putea să vă placă și