Documente Academic
Documente Profesional
Documente Cultură
2 Marks 1. What is pervasive computing? Pervasive Computing is a technology that pervades the users environment by making use of multiple independent information devices (both fixed and mobile, homogeneous or heterogeneous) interconnected seamlessly through wireless or wired computer communication networks which are aimed to provide a class of computing / sensory / communication services to a class of users, preferably transparently and can provide personalized services while ensuring a fair degree of privacy / non intrusiveness. 2. What are the basic aspects or of a Pervasive Computing environment! "ultiple devices like car key, mobile phones, car audio system, and navigation system are integrated in the system# $ large number of different interfaces are used to build an optimized user interface# %here is a concurrent operation of offline, and temporary online systems# $ large number of specialized computer systems are interconnected via local buses and the internet# &hort range and wide area wireless communication are integrated# &ecurity element provides unauthorized access# 5. What are the components of pervasive computing? Components of 'nfrastructure for Pervasive Computing include "obile computing devices, (ixed computing devices, "ultimode )( "obile communication infrastructure <Fixed-to-Mobile and Mobile-to- Fixed communication system interfaces>, %rust system (security and privacy), Protocol stacks and Personalized service frameworks# 3. List the characteristics of a Pervasive Computing? Privacy * &ecurity +ffectiveness of $pproach $cross ,etworks +conomic considerations -uality considerations "onitoring mechanisms $daptability and (lexibility Practicability &ustainability 4. efine roaming environment? )oaming +nvironment. $n environment that allows connectivity and communication to the services outside the home zone is called a )oaming +nvironment# &ome sample devices that may involve )oaming based access /fixed / mobile roaming0. P1$s / Palmtops / Pocket PCs / Cell phones / &mart phones / 2$P phones 3
!. List the issues invo"ve# in pervasive computing techno"og$? (eature specific issues (orm factor (size) specific issues Power provisioning issues 2eight specific issues &hape specific issues Cooling specific issues Connectivity specific issues 7ser 'nterface specific issues %. What are the ke$ parts of the har#&are of pervasive techno"ogies? Power provisioning technologies 1isplay technologies "emory technologies Communication technologies Processor technologies 'nterfacing technologies &ensor %echnologies $uthentication %echnologies '. efine Lo&(po&er evice )echno"ogies? &ince many of the devices involved in the pervasive computing environment may have to be small in size and may have to live on their battery / power units, consumption of lower power, extension of power provisioning period etc# assume critical significance# 'n addition, prevention from excessive heating also re8uires attention# Power re8uirements can be reduced by several means right from material selection and chip level designing to software designing and communication system designing# Power provisioning technology including the 9attery design technology plays a very important role in the process# *. List the ma+or #isp"a$ #evice techno"ogies in pervasive computing? Cathode )ay %ube based 1isplays (C)%s) 4i8uid Crystal 1isplays (4C1s) $ctive "atrix 1isplays %hin (ilm %ransistor 1isplays (%(%s) Passive "atrix displays &ingle &can 1isplays (Colour &uper %wist ,ematic. C&%,s) 1ual &can 1isplays (1ual &uper %wist ,ematic. 1&%,) :
>
$s the mobile devices are handy and small this imposes the size reduction in the hardware# %he size of the input and output component contribute to the total size of the mobile device# %oday both input and output components are integrated into the same ?
3G
"obile devices use keyboard and displays to interface with the users# %hey are much smaller and specialized for the application and the form factor of particular devices# +x. 3# &ome mobile devices have only number keys and few extra keys for built in menu :# &ome devices limit the number of mechanical keys to absolute minimum which is used to trigger the important application for navigation# @# %here are devices that have no display or keyboard# &uch devices are called headless devices# <avigationA %o operate application in mobile de@vices the user navigates through menu structure# )xample %he integrated cursor key which delivers signal for all four directions by pressing or moving# 9uttons can be operated withy thumb# %he buttons can be turned vor pressed# (or each step in one direction the menu navigator selects and highlights one of the entries# %he entry is selected by pressing the buttons# -aptic interfaceA %he aptic interface is basically a rotating control control with force feedback and a push button integrated into one >e$boar#sA %ypes. <nscreen keyboard (italy %egie %J <ctave -an#&riting recognitionA 2ord recognition Character recognition 33
(3)2hen biometric system is tuned to achieve small ($), it increases ()) and service will be banned# 1<& is acceptable if a reasonable exception path exists# (:)9iometric system has semantic problems (eg) service may be denied if finger is dirty or inAured# (@) ;ence biometric application is limited to application where ade8uate back up is present incase of 1<&# (>)&usceptible to fraud unless the total system is securely encapsulated and communicates via secure channel# Penbased device may use signature to verify and to secure access to device (or signature ($) ()) LG#3M LCM
%he system is prone to tampering because none of the systems are encapsulated in a secure housing# 4. 23p"ain 01 concepts in pervasive computing Palm <s +P<C 2indows C+ -,N ,eutrino 9e<& +mbedded 4',7N
%he core function of the pervasive device is determined by its operating system# %he maAor difference of operating system for pervasive devices from the userHs point of view# (3) ;uman machine interface (:) &peed# %he pervasive operating system the basic concepts of operating system# T*+ T'),$& F+' ")'-#&.-) %+M"(T.,/ +")'#T.,/ &0&T)M (3) Personal use. Palm <& and windows C+# (:) (or home use. 4inux, 9e<& PALM OS: "ost successful <& for P1$# $vailable with &ony, '9"# &uccess is because it is designed specifically for P1$#;ence 6nown as Oen of P1$#
3@
EPOC:
+P<C was created by psion maintained by &ymbian# %here are : versions# +P<C 3F and +P<C @: for 3F and @: bit processors respectively# %he current version of +P<C is release C which is available for 3F bit and @: bit processors# +P<C supports 7nicode and can display :CF colours# Core operating s$stemA +P<C is multitasking# %he <& architecture is represented by the figure# %he base layer provides the fundamental $P'# %he middleware layer provides the component needed to support =7' and application# +'6<, is the system =7' frame work# (inal layer is the applications# 0perating s$stem featuresA (3) 7ser management# (:) %ask management# (@) 7ser interface# (>) "emory management# Win#o&s C2A %his is an embedded <#& developed by "icrosoft# 2indows C+ user interface is similar to that of windows user interface# %he current version is @#G# 2indows C+ is 3>
3C
2mbe##e# L.<DCA %his is a stripped down 4',7N <#& with support to pervasive devices# %here is no standard for embedded 4',7N# %here is a consortium which promotes embedded 4',7N systems# 7sed in "'Ps, $)", "otorola, 'ntel processor# Core operating s$stem functiona"it$A Configurable 6ernel &calability ,etworking 0P2=/).<9 1E1)2M 62/)D=21A (3) 7ser management# (:) %ask management (@) <perating system size (>) 7ser interface (C) "emory management 5. 9ive the overvie& of #evice connectivit$ Protoco"s 2ireless protocols 2$P/2"4 <9+N (9luetooth) "obile phone technology "obile internet protocol &ynchronization * transaction based protocols 1istributed services "essage * transaction based protocols 1ecurit$ Concepts 1evice security &erver side security Cryptographic algorithms evice management 1evice management challenges &oftware distribution $pproaches
3F
%he user cannot falsely deny later that the user has authorized a transaction 1igital signature can be used to prevent repudiation# P 1evice security P 2$P phones evice managementA ;ere we discuss about the maAor challenges of devices management example of device management software distribution and approaches to solve the device management Challenges of device management )he serious cha""enges pose# are 3# tracking device location :# device user relation ship @# version control of device and software ># software updates of existing devices C# installation of new software on existing devices F# providing secure access to device information /pproaches 3# hardware capabilities :# hardware and software version management @# library management ># device are not always connected / unstable connection C# insecure connection !. 23p"ain pervasive &eb app"ication architecture %he architecture proposed for pervasive computing application support multiple devices like pl 2$P P1$ etc voice only enabled phones access the web server through voice gate way # )he prob"ems inc"u#e 3# 5ariety of 1evice :# "ark up languages @# $uthentication method %he challenges faced are many# (or example users may have different devices that appear and behave differently# ;ence applications that support pervasive computing should adapt to the device that are used hence application must provide content in a form that is appropriate for userHs specific device# 'f the device capabilities differ, the interaction between the user and the web application has to be tailored to that of the device capabilities to provide good usage# 3?
-ence architecture shou"# 3# (ilter unnecessaryQ information :# flexible to adapt to different user devices# @# $dapt to scalability ># &atisfy performance 1ca"abi"it$ an# avai"abi"it$ &calability and availability are maAor issues that should be catered in pervasive computing application /vai"abi"it$ %he services should be available at all times when they need it they assume that it does not work and switch to another service provider# eve"opment team nee#e# to #eve"op pervasive computing &eb app"ication %he team needed has 3# business logic designers :# user interface designers @# application programmer ># experts Pervasive app"ication architecture Pervasive computing application has another complexity i#e# devices are different from each other# %here cannot be a command controller that will fit in all devices# %o support multi controllers the server will be a dispatcher to invoke the appropriate controller based up on the device# ;ence to avoid duplication of code for invoking a model function between controllers we use a command pattern Comman# Command is a bean with input and output properties# 1ecuring pervasive computing app"ication 2eb applications supporting pervasive devices should be secure by having encryption authentication and authorization# %he architecture processes the client re8uest on the application server securely# 3J
:G
:3
::
:@
%he application uses s '1 and a numerical password for authentication# %his has the advantage because it can work on any phone# 9ut from the user point of view it is inconvenient# %he alternatives to this approach are Customer . using M.1.1 < numbers. "'&'&1, is a number to identify the device# ;ence this is a uni8ue number# %his "'&'&1, can be considered as a password# %he 7'1 will be the telephone number# 2hen logged in via mobile phone number this redirects to the shop to find the e8uivalent "'&'&1, number# Customer authentication using W.M 2'" allows secure authentication via internet# 1uring registration the user will have to registrator a 2$P certificate with the shop which gives the shop a mapping of certification to user '1 number# 2hen a customer with a 2'" enabled phone logs onto the shop may send a 2"4 page, 2"4 script generates a signature over a random challenge from the server using appropriate private key export the certificate for the key and signature and 2$P certificate back to server for authentication# Mu"tipart responses "ultipart response allows server to chain files and return to the client in one response# /#vantageA )educe the number of re8uest from the mobile device to the server# .nput va"i#ation using WML script $pplication needs inputs to be validated# 2"4 scripts can be used to validate user input on the 2$P device to reduce the number of transactions#
:E
:# 2rite down the functionality of 2$P in access via 2$P (Page : 24) 4.2I4.)ech. 29=22 2C/M.</).0<K M/EIHD<2 2,13 Part $ 3# 2hat are the key parts of the hardware of pervasive technologies! (Page : 2) :# ;ow does the biometric authentication work in pervasive computing! (Page : 5) Part 9 3# ;ow is security in pervasive computing established! +xplain them in detail (Page : 16) :# 2rite short notes on the smart card based authentication via the internet (Page : 21) 4.2I4.)ech. 29=22 2C/M.</).0<K M/EIHD<2 2,12 Part $ 3# 2hat is meant by pervasive computing! ;ow is it done! ?Page A 1@ :# 2hat makes device connectivity possible in pervasive computing! (Page A 5@ Part 9 3# (i) +xplain the operating system issues related to miniature devices# ?Page A 13@ (ii)2hat are the design and implementation issues in device connectivity aspect of pervasive computing! +xplain# ?Page A 1!@ :#+xplain the various soft surface and semi soft surface based based display systems and technologies# ?Page A *@ 4.2I4.)ech. 29=22 2C/M.</).0<K M/EIHD<2 2,12 Part $ :?
Part 9 3#(i) 1escribe the various hardware components involved in pervasive computing devices# ?Page A '@ (ii) +xplain how a pervasive web application can be secured using an S$uthentication ProxyH ?Page A 1%@ :(i) 2hat are the applications of pervasive computing! 1iscuss any two of them# ?PageA!@ (ii) +xplain how pervasive web application can be accessed via 2$P# ?Page A 25@
:J