Sunteți pe pagina 1din 68

Overview

Abstract
The local mobile phone device mainly used for phone calls and writing text messages
now developed to the smartphone and has become a multi-purpose device. Because
of its size and thermal constraints there are certain limitations in areas of battery life
and computational capabilities. In this project I want research about the execution
problems than occur when running a specific application in different version of
Android through cloud computing, cloud computing is emerging as one of the most
important branch for providing seamless applications on mobile devices, in addition
cloud computing is introduced as a new and speedily growing and accepted way of
providing better and efficient applications for mobile devices. It provides mobile
users with data storage and processing services on a cloud computing platform.
Keywords: MCC, Android and Application versions, Cloud computing.
Acknowledgement

All glory be to Allah for helping me to witness this Memorial Day in my life, I would like to

express my unlimited gratitude to Allah once again.

The Libyan government, faculty of science and computer science department as well as all

my lecturers.

Besides, I express my gratitude to my family and friends all over the world for their

magnificent prayers and advises.

I really appreciate all your effort thank.


TABLE OF CONTENT

Chapter 1 Overview
Quran Verse: ... I
Dedication: ....II
Acknowledgement:......III
Content: ...IV
Figures Content: VIII

1.1 Background .. 1

1.2 Why CC .... 2

1.3 Benefits of CC .. 3

1.3.1 Flexibility ...... 3

1.3.2 Disaster Recovery ..... 3

1.3.3 Automatic Software Updates ...... 3

1.3.4 Capital-Expenditure Free ... 4

1.3.5 Increased Collaboration ...... 4

1.3.6 Work from Anywhere ...... 4

1.3.7 Document Control .... 5

1.3.8 Security ..... 5

1.3.9 Competitiveness .... 5

1.3.10 Environmentally friendly .... 6

1.4 Aims ...... 7

1.5 Objectives . 7

1.6 Thesis Outline .. 8


Chapter 2 Introduction
2.1 Introduction . 9

2.2 Use of CC .... 10

2.3 The Process of CC ..... 10

2.4 CC Significant .... 12

2.5 Cloud Commuting ..... 13

2.5.1 Public Clouds ..... 13

2.5.2 Private Clouds .... 14

2.5.3 Hybrid Clouds .... 15

2.6 CC Services Types . 16

2.6.1 Infrastructure as a Service (IaaS) .... 16

2.6.2 Platform as a Service (PaaS) .... 17

2.6.3 Software as a Service (SaaS) ..... 18

2.7 Advantages of CC ...... 19

2.7.1 Fresh Software ... 21

2.7.2 Do more with less ... 22

2.7.3 Flexible Costs ..... 22

2.7.4 Always-on Availability ...... 22

2.7.5 Improved Mobility ........ 23

2.7.6 Improved Collaboration ....... 23

2.7.7 CC is more Cost Effective . 23

2.7.8 Expenses can be Quickly Reduced ... 23

2.7.9 Flexible Capacity ... 24

2.7.10 Facilitate M&A Activity ... 24


2.7.11 Less Environmental Impact ..... 24

Chapter 3 Literature Review


3.1 Introduction ... 25

3.2 Mobile Cloud Computing (MCC) .... 26

3.3 Why MCC .. 27

3.4 Features of Mobile Computing . 27

3.4.1 Mobility .... 28

3.4.2 Diversity of Network Conditions ... 28

3.4.3 Frequent Disconnection and Consistency . 28

3.4.4 Dis-Symmetrical Network Communication . 28

3.4.5 Low Reliability .... 28

3.4.6 Challenges .29

3.5 Current State of MCC ... 29

3.6 Mobile Platforms ... 29

3.6.1 Nokia Abandons MeeGo .... 31

3.6.2 Platforms Tablets 31

3.6.3 Trends ...32

3.6.4 Issues .... 32

3.7 Android Operating System ... 33

3.7.1 Application Program Interface ...34

3.7.2 Different Types of APIs .. 34

3.8 MCC Architecture . 35

3.8.1 MCC Loss of Connection ... 36


3.8.2 MCC Middleware Push . 36

3.8.3 MCC Bandwidth/Latency .. 37

3.8.4 MCC Result Optimization ..... 37

3.8.5 MCC Personal Mashup Platform .. 37

3.9 Potential Problems . 38

3.9.1 Cheap Data and Data Analysis .. 38

3.9.2 Cost-Effective Defense of Availability ... 39

3.9.3 Increased Authentication Demands .. 39

3.9.4 Mash-Up Authorization . 40

Chapter 4 The Future of Mobile Cloud Computing


4.1 Introduction ... 41
4.2 Mobile Computing Classification ..... 42
4.2.1 Personal Digital Assistant (PDA) .. 42
4.2.2 Smartphones ... 43
4.2.3 Tablet PC and iPads .... 44
4.3 Application of MCC .. 44
4.3.1 Mobile Commerce .. 45
4.3.2 Mobile learning .. 45
4.3.3 Mobile Healthcare .. 45
4.3.4 Mobile Gaming ....... 46
4.4 Security Issues . 46
4.5 Cloud Computing is the Future of Mobile Devices .... 48
4.5.1 Extended Battery Life .... 49
4.5.2 Abundant Storage Space ... 49
4.5.3 Improved Data-Synching Techniques ... 49
4.5.4 Enhanced Processing Facilities . 49
4.5.5 Superior User-Experience ..... 49
4.5.6 Scope to Embrace New Technologies ... 50
4.6 MCC Current Trends ... 50
4.6.1 Third Generation 3G .. 50
4.6.2 Global Positioning System (GPS) . 50
4.6.3 Long Term Evolution (LTE) . 51
4.6.4 WiMAX ... 51
4.6.5 Near Field Communication ... 51

Chapter 5 Conclusion
Conclusion .. 53

References ... 54

Figures Content
Fig 2.1: Cloud Computing Architecture ... 9

Fig 2.2: Cloud Architecture .. 11

Fig 2.3: Cloud Connectivity .. 13

Fig 2.4: Devices with Cloud Computing ..16

Fig 2.5: Cloud Computing Types .. 18

Fig 2.6: IT Budget .. 20

Fig 2.7: Cloud Measurement Impact on Business ..21

Fig 3.1: Paradigm of Mobile Computing Architecture ..... 26

Fig 3.2: Lifecycle for an Android Application Activity . 33

Fig 4.1: PDA .. 42

Fig 4.2: Smartphones 43

Fig 4.3: Tablet PC and iPads 44

Fig 4.4: Security Application 47

Fig 4.5: MCC with Different Mobile Devices


Chapter 1
1.7 Background

These days cloud commuting is very famous and it is used to run various types of business

application. To create cloud commuting environment internet, server hardware, cloud operating

system (OS) is needed. The cloud OS is installed on the hardware. It provides interfaced between

user and server and manages and distributes all resources of cloud systems. Some of the cloud OS

are eye OS, VMware cloud OS and iCloud.

With the help of utilities provided by cloud OS we can create virtual servers for clients. Clients

can login and use the allocated virtual server/resources. We can increase and decrease the resource

usage by client.

Mobile phone is the new personal computer and its functionality is continually increasing. The

mobile phones are increasingly used for web browsing, email and multimedia, to mention a few

areas [3].

Cloud computing (CC) has been suggested to improve mobile phones in various ways, but two

common areas are battery life extension and computational offloading [5]. Mobiles are now

essential part in this modern age of education, business world and significance of mobile database

is unavoidable.

According to a novel study from ABI research CC will entirely renovate future of mobile

applications development and their utilization. CC offers a range of new opportunities and its

issues for developing countries to do what they could not do earlier with computers and the

Internet.

CC infrastructure and applications are able to interact with users who have mobile phones, Tablet

PCs, OLPC and One-Laptop-per-Child. It is growing fast and companies are taking full advantage

of the services provided by CC.


1.8 Why CC

CC is a computing based on the internet. Where in the past, people would run applications or

programs from software downloaded on a physical computer or server in their building, CC allows

people access to the same kinds of applications through the internet.

When you update your Facebook status, youre using CC. Checking your bank balance on your

phone? Youre in the cloud again. Chances are you rely on CC to solve the challenges faced by

small businesses, whether youre firing off emails on the move or using a bunch of apps to help

you manage your workload.

In short, cloud is fast becoming the new normal. By the end of 2015 its estimated that 90% of UK

businesses will be using at least one cloud service.

1.9 Benefits of CC

So many businesses moving to the cloud, because CC increases efficiency, helps improve cash

flow and offers many more benefits. Here's ten of the best.
1.9.1 Flexibility

Cloud-based services are ideal for businesses with growing or fluctuating bandwidth demands. If

your needs increase its easy to scale up your cloud capacity, drawing on the services remote

servers. Likewise, if you need to scale down again, the flexibility is baked into the service.

This level of agility can give businesses using cloud computing a real advantage over competitors

its not surprising that IT Directors rank operational agility as a top driver for cloud adoption.

1.9.2 Disaster Recovery

Businesses of all sizes should be investing in robust disaster recovery, but for smaller businesses

that lack the required cash and expertise, this is often more an ideal than the reality. Cloud is now

helping more organizations buck that trend. According to Aberdeen Group, small businesses are

twice as likely as larger companies to have implemented cloud-based backup and recovery

solutions that save time, avoid large up-front investment and roll up third-party expertise as part

of the deal.

1.9.3 Automatic Software Updates

The beauty of CC is that the servers are off-premise out of sight. Suppliers take care of them for

you and roll out regular software updates including security updates, so you dont have to worry

about wasting time maintaining the system yourself. Leaving you free to focus on the things that

matter, like growing your business.

1.9.4 Capital-Expenditure Free

CC cuts out the high cost of hardware. You simply pay as you go and enjoy a subscription-based

model thats kind to your cash flow. Add to that the ease of setup and management and suddenly
your scary, hairy IT project looks at lot friendlier. Its never been easier to take the first step to

cloud adoption.

1.9.5 Increased Collaboration

When your teams can access, edit and share documents anytime, from anywhere, theyre able to

do more together, and do it better. Cloud-based workflow and file sharing apps help them make

updates in real time and gives them full visibility of their collaborations.

1.9.6 Work from Anywhere

With CC, if youve got an internet connection you can be at work. And with most serious cloud

services offering mobile apps, youre not restricted by which device youve got to hand.

The result, businesses can offer more flexible working perks to employees so they can enjoy the

work-life balance that suits them without productivity taking a hit. One study reported that 42%

of workers would swap a portion of their pay for the ability to telecommute. On average theyd be

willing to take a 6% pay cut.

1.9.7 Document Control

The more employees and partners collaborate on documents, the greater the need for watertight

document control. Before the cloud, workers had to send files back and forth as email attachments

to be worked on by one user at a time. Sooner or later, usually sooner you end up with a mess of

conflicting file content, formats and titles.

And as even the smallest companies become more global, the scope for complication rises.

According to one study, "73% of knowledge workers collaborate with people in different time

zones and regions at least monthly.


When you make the move to CC, all files are stored centrally and everyone sees one version of the

truth. Greater visibility means improved collaboration, which ultimately means better work and a

healthier bottom line. If youre still relying on the old way, it could be time to try something a little

more streamlined.

1.9.8 Security

Lost laptops are a billion dollar business problem. And potentially greater than the loss of an

expensive piece of kit is the loss of the sensitive data inside it. CC gives you greater security when

this happens.

Because your data is stored in the cloud, you can access it no matter what happens to your machine,

and you can even remotely wipe data from lost laptops so it doesnt get into the wrong hands.

1.9.9 Competitiveness

Wish there was a simple step you could take to become more competitive? Moving to the cloud

gives access to enterprise class technology, for everyone. It also allows smaller businesses to act

faster than big, established competitors. Pay-as-you-go service and cloud business applications

mean small outfits can run with the big boys, and disrupt the market, while remaining lean and

nimble.

1.9.10 Environmentally friendly

While the above points spell out the benefits of CC for your business, moving to the cloud isnt an

entirely selfish act. The environment gets a little love too. When your cloud needs fluctuate, your

server capacity scales up and down to fit. So you only use the energy you need and you dont leave
oversized carbon footprints. This is something close to our hearts at Salesforce, where we try our

best to create sustainable solutions with minimal environmental impact.

Any three of the above benefits would be enough to convince many businesses to move their

business into the cloud. But when you add up all ten? Its approaching no-brainer territory.

This is why Salesforce pioneered enterprise cloud computing. From Customer Relationship

Management (CRM) to marketing automation, all of our solutions are entirely cloud-based.

1.10 Aims

The aim of this study is to investigate if the cloud can be used to execute a specific mobile phone

application in different android version, in comparison to their computing capabilities as well as

the function.

The collaboration advantages, and disadvantages, with mobile phones and CC will also be

investigated

1.11 Objectives

To gather results from various devices would need several different mobile phone applications and

because Android applications only work for Android mobile phones this research will only focus

on that type of device. The cloud will be represented by Googles App Engine platform only and

will not consider other cloud vendors like Windows or Amazon.

Different cloud platforms could have been considered but because of various limitations Googles

App Engine platform was the only one used. The main objective of this study will focus on these

steps:-
1. CC can be used in mobile phone to execute a different version of mobile phone applications

on different android versions

2. Features of mobile phone applications which would benefit to use CC to improve the

execution time of mobile phones

3. Possible advantages and disadvantages of using CC in mobile phone applications

4. CC services can be used by smart phones and other resource-starved devices

5. The types of communication network architectures which can be used in order to support

CC services on smart phones and other resource-starved devices

1.12 Thesis Outline

In this study will investigate and explain the architecture of CC, mobile cloud commuting, the

significant and benefits. In additional the process, types and the future of cloud computing. The

rest of the thesis is organized as follows.

Chapter 2 presents an overview of mobility and considers the basic operation of Mobile IP. This

chapter includes details of some Mobile IP shortcomings, improvements and mobility

managements.

Chapter 3 presents the new idea and the algorithm of the Enhanced Mobile IP handover based on

link layer information, thereafter explaining the design and the performance of this scheme. It then

goes on to describe the experimental scenarios and the setting of simulation parameters. In

addition, this chapter presents and analyzes the performance results of the Enhanced Mobile IP

handover based link layer information.

Chapter 4 presents the new idea and the algorithm of the Low Latency handover in Mobile IP and

explains the design and the performance of this scheme. It then continues to describe the

experimental scenarios and the setting of simulation parameters. In addition, this chapter presents
and analyzes the performance results of the pre- and post-registration algorithms in handover rate

and packet loss.

Chapter 5 presents the proposal algorithm of the Fast Mobile IPv6 handover based link layer

information. Moreover, in this chapter, a detailed comparison with the other existing scheme is

undertaken.

Chapter 6 concludes the dissertation and points to potential areas for future research.
Chapter 2
Introduction
2.8 Introduction

CC is one of the computing model not a technology. It is another version of internet technology.

In this model customers plug into the cloud to access information technology (IT) resources which

are priced and provided on-demand. Essentially, these IT resources are accessible and shared

among multiple users.

In very easy words we can define CC as it is provider of pooled network resources such as CPU,

RAM, Storage, software over the web. These services are easily provides and released on demand.

These days hosting companies are provided cloud servers, cloud resources, cloud storage, software

hosted on the cloud environment. The business people use cloud in minimum cost they just pay

for the storage usage.

Fig 2.1: Cloud Computing Architecture

CC combine virtualization one computer hosting several virtual servers, automated provisioning

servers have software installed automatically and Internet connectivity technologies to provide the

service. These are not new technologies but a new name applied to a collection of older

technologies that are packaged, sold and delivered in a new way.


2.9 Use of CC

To acquire and use CC needed a credit card or other payment method and a local area network

(LAN) with an Internet connection robust enough to support the cloud delivered service. These

two requirements are deceptively simple. Typically, Internet access is provided by a single

commercial service internet service provider (ISP) provider through a single port on a router. A

characteristic of this type installation is that all of the computers connecting through the LAN share

the Internet bandwidth equally.

Suppose a business had 5 computers using a cloud solution and sending data to the cloud for

processing. The bandwidth available to each computer would be 373Kbps (up 1867/5). That is

about 46 (8 bit) characters per second to the cloud application and does not include any

communication or application data. The cloud does not work to slow. It is easily accessible by the

user when they want to use it.

2.10 The Process of CC

In a large university or a consortium might become a provider of cloud services. Storage and

processing needs can also be met by the cloud. Institutions pay only for the resources used, and

users can access the applications and files they need from virtually any Internet-connected

computer. In a mature CC environment, institutions would be able to add new IT services or

respond to changes in capacity on the fly, saving capital costs that can be redirected to programs

of strategic value to the institution [7].

CC is actually a website that lets you access an application that can do different things. The basic

concept is that you should not install any application on your computer. We can access the
application as well and back at home on your computer, and from a public computer located in a

mall or another store.

This is an advantage if you have a job that requires always to be connected with other people, such

as for example a manager or promoter. If your boss asks for a report and youre in the mountains

for a few days of relaxation, you can access the application of CC architecture and will make the

report required, and besides that you get a bonus. The CC architecture includes different types of

services.

Fig 2.2: Cloud Architecture

Mode of operation is very simple, as is the start of an application, Due to the low cost of application

and hardware resources needed to run this little application is very easy to implement in a

company. Comparing the costs of a normal PC application, applications deployed in the cloud are

several times cheaper. An estimated cost for an application for text editing in the cloud reaches $

10 per month, while the Office suite can cost over $ 1000.
Another type of CC architecture is growing is utility computing. For the use cloud commuting only

need to pay for the usages of resources. Among the leading providers of utility computing are

Amazon, Microsoft and Google are in a constant struggle for customers.

Due to low cost utility computing in a few years will become a trend in terms of servers. CC allows

freedom of movement that NO other service you can offer [3].

2.11 CC Significant

CC presents with different model of operation, advantage of the maturity of web applications and

networks and the rising interoperability of computing systems to provide IT services. Cloud

providers specialize in particular applications and services, and this expertise allows them to

efficiently manage upgrades and maintenance, backups, disaster recovery, and failover functions.

As a result, consumers of cloud services have advantageous as reliability, even as costs decline

due to economies of scale and other production factors. With CC, organizations can monitor current

needs. Aside from the potential to lower costs, colleges and universities gain the flexibility of being

able to respond quickly to requests for new services by purchasing them from the cloud.

Finally, CC allows college and university IT providers to make IT costs transparent CC encourages

IT organizations and providers to increase standardization of protocols and processes so that the

many pieces of the CC model can interpret properly and efficiently.

CC scalability is another key benefit to higher education, particularly for research projects that

require vast amounts of storage or processing capacity for a limited time. Some companies have

built data centers near sources of renewable energy, such as wind farms and hydroelectric facilities,

and CC affords access to these providers of green IT [7].


2.12 Cloud Commuting

CC comes in three forms public clouds, private clouds, and hybrids clouds, depending

on the type of data you're working with, you'll want to compare public, private, and

hybrid clouds in terms of the different levels of security and management required.

Fig 2.3: Cloud Connectivity

2.12.1 Public Clouds

It is a traditional concept of CC and we can use from anywhere anytime. These clouds can be used

in a so-called pay-per-use manner, meaning that just the resources that are being used will be paid

by transaction fees

A public cloud is basically the internet. Service providers use the internet to make resources, such

as applications (also known as Software-as-a-service) and storage, available to the general public,

or on a public cloud.

Examples of public clouds include Amazon Elastic Compute Cloud (EC2), IBMs Blue Cloud,

Sun Cloud, Google App Engine and Windows Azure Services Platform.
For users, these types of clouds will provide the best economies of scale, are inexpensive to set-up

because hardware, application and bandwidth costs are covered by the provider. Its a pay-per-

usage model and the only costs incurred are based on the capacity that is used.

There are some limitations, however; the public cloud may not be the right fit for every

organization. The model can limit configuration, security, and SLA specificity, making it less than

ideal for services using sensitive data that is subject to compliancy regulations.

2.12.2 Private Clouds

Private clouds are more secure than public CC. In this we are used in a private network so it

restricts to use the unwanted public to access the data that is used by the company. Thats why it

needed more building and maintenance of the system.

Private clouds are data center architectures owned by a single company that provides flexibility,

scalability, provisioning, automation and monitoring. The goal of a private cloud is not sell as-

a-service offerings to external customers but instead to gain the benefits of cloud architecture

without giving up the control of maintaining your own data center.

Private clouds can be expensive with typically modest economies of scale. This is usually not an

option for the average Small-to-Medium sized business and is most typically put to use by large

enterprises. Private clouds are driven by concerns around security and compliance, and keeping

assets within the firewall.


2.12.3 Hybrid Clouds

As the name suggest, a hybrid cloud is a combination of both a private and public cloud. In this

work load being processed by an enterprise data center while other activities are provided by the

public cloud [8].

By using a hybrid approach, companies can maintain control of an internally managed private

cloud while relying on the public cloud as needed. For instance during peak periods individual

applications, or portions of applications can be migrated to the Public Cloud. This will also be

beneficial during predictable outages, hurricane warnings, scheduled maintenance windows,

rolling brown/blackouts.

The ability to maintain an off-premise disaster recovery site for most organizations is impossible

due to cost. While there are lower cost solutions and alternatives the lower down the spectrum an

organization gets, the capability to recover data quickly reduces. Cloud based Disaster Recovery

(DR)/Business Continuity (BC) services allow organizations to contract failover out to a Managed

Services Provider that maintains multi-tenant infrastructure for DR/BC, and specializes in getting

business back online quickly.


2.13 CC Services Types

2.13.1 Infrastructure as a Service (IaaS)

These CC saves cost and time of capital equipment deployment but does not reduce the cost of

configuration, integration or management and these tasks must be performed remotely it provides

grids or clusters or virtualized servers, networks, storage and systems software, usually (but not

always) in a multitenant architecture. IaaS is designed to augment or replace the functions of an

entire data center. It would include Amazon.com (Elastic Compute Cloud [EC2] and Simple

Storage), IBM and other traditional IT vendors

Fig 2.4: Devices with Cloud Computing

IaaS is based on the provisioning of computing resources which are more hardware oriented.

According to NIST the provisioning of processing, storage, networks, and other fundamental

computing resources where the consumer is able to deploy and run arbitrary software, which can

include operating systems and applications from [15] fall under this category.
The user with IaaS is able to run and manage own operating systems including applications by

using virtualization technologies. Furthermore he can make use of storage systems and/or network

devices like e.g. firewalls.

The management of the underlying infrastructure is done by the service provider of the cloud,

though the user has full control over operating systems, applications and storage and eventually

partial control over network devices.

Examples for this type of service model are Amazon EC2 for computation power and Amazon S3

for storage provisioning.

With a view to mobile environments, this service model does not seem to be appropriate for mobile

usage of cloud services, as it is highly focused on the provision of hardware based services with a

low level of abstraction. It might only be interesting in the case of storage provisioning for mobile

devices.

2.13.2 Platform as a Service (PaaS)

PaaS gives users the opportunity to run applications on the infrastructure offered by the service

provider. However, it requires that the applications are created with programming languages or

tools that are supported by the service provider.

The management of the underlying infrastructure and operating systems is in the hands of the

service provider. Though the user has full administrative control over the applications he wants to

host on the cloud system.

Examples for this type of service model are Google App Engine, Force.com and Microsoft

Windows Azure. Looking at mobile usage of CC services, this service model seems to be of

interest, because it gives users the possibility to outsource applications or parts of them to the

cloud.
As a result, users can make use of the benefits a CC system can offer them, including scalable and

fast computation resources, which in the end could save time and energy.

By using PaaS we can create and run our own application: without having to worry about

maintaining the operating systems, server hardware, load balancing or computing capacity. It

provides APIs or development platforms to create and run applications in the cloud e.g. using the

Internet. Well known providers include Microsoft's Azure, Sales forces Force.com, Google Maps,

ADP Payroll processing, and US Postal Service offerings.

2.13.3 Software as a Service (SaaS)

SaaS is the most widely known and widely used forms of CC. It provides all the functions through

web to many customers and often thousands of users of all the sophisticated traditional

applications. Little or no code is running on the User's local computer. SaaS eliminates customer

worries about application servers, storage, application development and related, common concerns

of IT.

Fig 2.5: Cloud Computing Types


The most common examples are Salesforce.com, Google's Gmail and Apps, instant messaging

from AOL, Yahoo and Google, and VoIP from Vonage and Skype [6].

SaaS focuses on the provisioning of applications. The management of the underlying

infrastructure, operating systems and even the configuration of the application itself (with

exemption of some partial elements) is completely done by the service provider.

Examples for this type of service model are Google Docs, Microsoft Office Web Apps and
Apple iWork.com. With regard to mobile usage, this service model might also be of interest,
although it fully depends on a working network connection between mobile devices and the
cloud system. However, the benefits of cloud systems, which might lead to savings in time and
energy consumption, also apply here [16].

2.14 Advantages of CC

While their motivations vary, businesses of all sizes, industries, and geographies are turning to

cloud services. According to Goldman Sachs, spending on CC infrastructure and platforms will

grow at a 30% compound annual growth rate (CAGR) from 2013 through 2018 compared with 5

percent growth for overall enterprise IT.

Cloud adoption is accelerating faster than previously anticipated, leading Forrester to recently

revise its 2011 forecast of the public cloud market size upward by 20 percent. Whether youre

looking at SaaS, IaaS or PaaS, the predictions are the same. Fast growth of the workloads placed

in the cloud and an increased percentage of the total IT budget going toward CC.
Fig 2.6: IT Budget

According to a study by the Cloud Security Alliance, 33% of organizations have a full steam ahead

attitude toward cloud services and 86% of companies spend at least part of their IT budget on cloud

services. IT leaders at 79% of companies receive regular requests from end users each month to

buy more cloud applications with file sharing and collaboration, communication, social media, and

content sharing topping the list of the most-requested cloud services.

Numerous factors are driving cloud adoption, according to a study conducted by the market

research company Vanson Bourne. The business impact of the cloud report compiles insights from

interviews of 460 senior decision-makers within the finance functions of various enterprises.

The report summarized 11 drivers of cloud adoption along with quantifiable improvements these

companies have achieved by deploying cloud services to improve productivity, lower cost, and

improve time to market.


Fig 2.7: Cloud Measurement Impact on Business

Though they arent in IT positions, the majority of these financial executives are actively involved

in their organizations discussions about cloud strategy.

Their perspective of CC includes benefits to the business as a whole. Companies that adopted cloud

services experienced a 20.66% average improvement in time to market, 18.80% average increase

in process efficiency, and 15.07% reduction in IT spending. Together, these benefits led to a

19.63% increase in company growth.

The Vanson Bourne report identified eleven advantages of CC that organizations are experiencing

today, leading to quantifiable improvements in their businesses.

2.14.1 Fresh Software

With SaaS, the latest versions of the applications needed to run the business are made available to

all customers as soon as theyre released. Immediate upgrades put new features and functionality

into workers hands to make them more productive. Whats more, software enhancements are
typically released quite frequently. This is in contrast to home grown or purchased software that

might have major new releases only once a year or so and take significant time to roll out.

2.14.2 Do more with less

With CC, companies can reduce the size of their own data centers or eliminate their data center

footprint altogether. The reduction of the numbers of servers, the software cost, and the number of

staff can significantly reduce IT costs without impacting an organizations IT capabilities.

2.14.3 Flexible Costs

The costs of CC are much more flexible than traditional methods. Companies only need to

commission and thus only pay for server and infrastructure capacity as and when it is needed.

More capacity can be provisioned for peak times and then de-provisioned when no longer needed.

Traditional computing requires buying capacity sufficient for peak times and allowing it to sit idle

the rest of the time.

2.14.4 Always-on Availability

Most cloud providers are extremely reliable in providing their services, with many maintaining

99.99% uptime. The connection is always on and as long as workers have an Internet connection,

they can get to the applications they need from practically anywhere. Some applications even work

off-line.
2.14.5 Improved Mobility

Data and applications are available to employees no matter where they are in the world. Workers

can take their work anywhere via smart phones and tablets roaming through a retail store to check

customers out, visiting customers in their homes or offices, working in the field or at a plant.

2.14.6 Improved Collaboration

Cloud applications improve collaboration by allowing dispersed groups of people to meet virtually

and easily share information in real time and via shared storage. This capability can reduce time-

to-market and improve product development and customer service.

2.14.7 CC is more Cost Effective

Because companies dont have to purchase equipment and build out and operate a data center, they

dont have to spend significant money on hardware, facilities, utilities and other aspects of

operations. With traditional computing, a company can spend millions before it gets any value

from its investment in the data center.

2.14.8 Expenses can be Quickly Reduced

During times of recession or business cut-backs like the energy industry is currently

experiencing, CC offers a flexible cost structure, thereby limiting exposure.


2.14.9 Flexible Capacity

Cloud is the flexible facility that can be turned up, down or off depending upon circumstances. For

example, a sales promotion might be wildly popular, and capacity can be added quickly to avoid

crashing servers and losing sales. When the sale is over, capacity can shrink to reduce costs.

2.14.10 Facilitate M&A Activity

CC accommodates faster changes so that two companies can become one much faster and more

efficiently. Traditional computing might require years of migrating applications and

decommissioning data centers before two companies are running on the same IT stack.

2.14.11 Less Environmental Impact

With fewer data centers worldwide and more efficient operations, we are collectively having less

of an impact on the environment. Companies who use shared resources improve their green

credentials.

Despite these advantage, the Cloud Security Alliance has identified several barriers holding back

cloud adoption. At 73% of companies, the security of data is the top concern holding back cloud

projects. Thats followed by concern about regulatory compliance (38%), loss of control over IT

services (38%), and knowledge and experience of both IT and business managers (34%). As

organizations address their security and compliance concerns by extending corporate policies to

data in the cloud and invest in closing the cloud skills gap, they can more fully take advantage of

the benefits of cloud services.


Chapter 3
Literature Review
3.10 Introduction

Mobility has become a very popular word and rapidly increasing part in todays computing area.

An incredible growth has appeared in the development of mobile devices such as, smartphone,

PDA, GPS Navigation and laptops with a variety of mobile computing, networking and security

technologies. In addition, with the development of wireless technology like WiMax, Ad Hoc

Network and WIFI, users may be surfing the Internet much easier but not limited by the cables as

before.

Thus, those mobile devices have been accepted by more and more people as their first choice of

working and entertainment in their daily lives. So, what is Mobile computing exactly? In

Wikipedia, it is described as a form of human-computer interaction by which a computer is

expected to be transported during normal usage [8].

Mobile computing is based on a collection of three major concepts: hardware, software and

communication. The concepts of hardware can be considered as mobile devices, such as

smartphone and laptop, or their mobile components. Software of mobile computing is the

numerous mobile applications in the devices, such as the mobile browser, anti-virus software and

games.

The communication issue includes the infrastructure of mobile networks, protocols and data

delivery in their use those must be transparent to end users.


3.11 Mobile Cloud Computing (MCC)

It is important to establish a common understanding of what mobile cloud means. Cisco IBSG

defines it as mobile services and apps delivered from a centralized (and perhaps virtualized) data

center to a mobile device such as a smartphone [10].

Fig 3.1: Paradigm of Mobile Computing Architecture

Nowadays, both hardware and software of mobile devices get greater improvement than before,

some smartphones such as iPhone 4S, Android serials, Windows Mobile serials and Blackberry,

are no longer just traditional mobile phones with conversation, SMS, Email and website browser,

but are daily necessities to users. Meanwhile, those smartphones include various sensing modules

like navigation, optics, gravity, orientation, and so on, which brings a convenient and intelligent

mobile experience to users.


In 2010, Google CEO Eric Schmidt described MCC in an interview that based on cloud computing

service development, mobile phones will become increasingly complicated, and evolve to a

portable super computer [11].

In the face of various mobile cloud services provided by Microsoft, Apple, Google, HTC, and so

on. Users may be confused about what MCC exactly is, and what its features are [12].

3.12 Why MCC

Survey says that smart phones will grow in percentage and feature phones will become more

sophisticated in time, these lower-end phones are not going away anytime soon. The MCC trend

is becoming conman. Most web developers capable of building mobile web applications than there

are developers for any other type of mobile device.

Those factors, combined with the fact that feature phones themselves are becoming more capable

with smarter built-in web browsers (and more alternative browsers available for download), will

have an impact on MCC growth [1].

3.13 Features of Mobile Computing

Mobile computing has many features that makes it so attractive to work on, that is why its business

is fast growing up.


3.13.1 Mobility

Mobile nodes in mobile computing network can establish connection with others, even fixed nodes

in wired network through Mobile Support Station (MSS) during their moving.

3.13.2 Diversity of Network Conditions

Normally the networks using by mobile nodes are not unique, such networks can be a wired

network with high-bandwidth, or a wireless Wide Area Network (WWAN) with low-bandwidth,

or even in status of disconnected.

3.13.3 Frequent Disconnection and Consistency

As the limitation of battery power, charge of wireless communication, network conditions and so

on, mobile nodes will not always keep the connection, but disconnect and consistent with the

wireless network passively or actively.

3.13.4 Dis-Symmetrical Network Communication

Servers and access points and other MSS enable a strong send/receive ability, while such ability

in mobile nodes is quite weak comparatively.

Thus, the communication bandwidth and overhead between downlink and uplink are discrepancy.

3.13.5 Low Reliability

Due to signals is susceptible to interference and snooping, a mobile computing network system

has to be considered from terminals, networks, database platforms, as well as applications

development to address the security issue.


3.13.6 Challenges

Compared with the traditional wired network, mobile computing network may face various

problems and challenges in different aspects, such as signal disturbance, security, hand-off delay,

limited power, and low computing ability.

Due to the wireless environment and numerous mobile nodes. In addition, the Quality of Service

(Q o S) in mobile computing network is much easier to be affected by the landforms, weather and

buildings [9].

3.14 Current State of MCC

MCC was defined in a 5 March 2010 entry in the Open Gardens blog as the availability of cloud

computing services in a mobile ecosystem. This includes many elements, consumer, enterprise,

femtocells (A femtocell is a small cellular base station), transcoding, end-to-end security, home

gateways, and mobile broadband-enabled services [2].

3.15 Mobile Platforms

Platform smart phone is the most ubiquitous platforms .The most-used mobile operating systems

are the Research in Motion (RIM) BlackBerry operating system, the Windows Mobile

operating system, Nokia's Symbian platform, and UNIX variations such as Google Android and

Apple iOS.

The BlackBerry operating system, developed by RIM, is a proprietary mobile operating system.

For application developers, it offers a Java development environment that includes a BlackBerry

IDE, a smart phone simulator, and APIs for Java Platform, Micro Edition (Java ME) and
BlackBerry. Applications are distributed through BlackBerry App World and third-party vendors

such as MobiHand.

The Android mobile operating system is built on a modified Linux kernel. Initially developed

by Android, Inc., and bought by Google in 2005, Android development and maintenance is now

performed by the Android Open Source .Android application developers write code mainly in the

Java using the Android SDK, which includes an emulator of a run time environment for testing

and debugging. Applications are distributed through the Google Android Market and other

distribution channels, such as GetJar and Handango.

Apple is derived from Apple Mac OS X, it is a set of UNIX-based operating systems and GUIs.

Developers build applications mainly in Objective-C using the Apple iOS SDK, Xcode, and

Interface Builder. Applications are distributed through Apple's App Store, which currently

contains more than 300,000 applications.

Windows Mobile proprietary operating system is called Windows Phone 7, which is a successor

to the Windows Mobile operating system. According to Microsoft, Windows Phone 7 was

designed for the user experience instead of enterprise support. Developers write the code to access

the mobile device through its APIs, but some APIs are not yet available, such as a compass API,

a video API, or a sockets API. Applications are distributed through the Windows Phone

Marketplace.

The Symbian platform is an open source operating system designed for Nokia Smartphones. It

uses a proprietary operating system services layer, with a Java ME application services layer.

Application developers write code in C++, the Java language, and Perl and use an SDK that can

be customized for the IDE the developer intends to use.


3.15.1 Nokia Abandons MeeGo

Nokia is abandoning an alliance to develop another open source mobile operating system called

MeeGothat it was developed jointly with Intel and a consortium of smaller companies. MeeGo is

aimed at a variety of platforms, including smart phones, tablets, automotive systems, and set-top

boxes. 2011 and 2012 will be transition years of smart phone sales.

3.15.2 Platforms Tablets

As of the end of 2010, the top-selling tablets were the Apple iPad and Android tablets made by

Samsung, Motorola, and Acer .Many tablet will be based on the Android operating system .Tablet

computers are larger than a smart phone but interact with the user in much the same way, using a

touchscreen as a primary input device. They often don't have a keyboard. Unlike laptops, they are

single-user personal devices; however, tablets access the cloud in the same manner as smart

phones.

RIM will introduce its BlackBerry PlayBook, which uses the BlackBerry Tablet OS. Motorola will

introduce its Android-based Xoom tablet. Apple will release its second- and third-generation iPad

tablets. Expected improvements include a dual-core processor, a higher-quality display, a front-

facing camera, and an SD card slot.


3.15.3 Trends

Now mobile cloud is in demand. Work patterns and habits are also changing, because of the mobile

cloud customers are demanding smart phone and tablet applications so they can access companies'

key applications.

Employees are demanding access from their mobile devices. Another trend points to the

mobilization of money through the mobile cloud. For example, the company Tabbed Out has

created a service that allows people to use their smart phones to open, review, and pay tabs.

Starbucks recently began allowing customers to pay for purchases with an application that accesses

the customer's account and generates an on-screen bar code that the cashier scans to complete the

payment. The customer's Starbucks account is replenished with a credit card or PayPal account.

3.15.4 Issues

Issue of mobile with the mobile cloud is the resource poverty of mobile devices. Compared to

desktop computers, they have a mini screen real estate, less compute power and memory, battery

capacity limits. Because of this resource poverty, the mobile cloud is viewed as an SaaS cloud,

meaning of that computation and data handling are usually performed in the cloud.

Smart phones access the cloud through internet or thin clients. The mobile cloud affected by the

Latency and bandwidth. It also affected by the WI-Fi improves latency but may decrease

bandwidth when many mobile devices are present.

Bandwidth for 3G cellular may be limited for cell tower bandwidth in some areas. Similarly,

connectivity may be intermittent. As cellular providers build out their networks, the situation will

improve. Security issues increase with mobile devices. After all, it's easier to lose a mobile device.
3.16 Android Operating System

Android is a mobile operating system developed by Google, based on the Linux kernel and

designed primarily for touchscreen mobile devices such as smartphones and tablets. Android's user

interface is mainly based on direct manipulation, using touch gestures that loosely correspond to

real-world actions, such as swiping, tapping and pinching, to manipulate on-screen objects, along

with a virtual keyboard for text input.

Fig 3.2: Lifecycle for an Android Application Activity

In addition to touchscreen devices, Google has further developed Android TV for

televisions, Android Auto for cars, and Android Wear for wrist watches, each with a specialized

user interface. Variants of Android are also used on notebooks, game consoles, digital cameras,

and other electronics.


Android has the largest installed base of all the OS of any kind and it has been the best-selling OS

on tablets since 2013, and on smartphones it is dominant by any metric [17, 18].

3.16.1 Application Program Interface

Application program interface (API) is a set of routines, protocols, and tools for building software

applications. An API specifies how software components should interact. Additionally, APIs are

used when programming graphical user interface (GUI) components. A good API makes it easier

to develop a program by providing all the building blocks. A programmer then puts the blocks

together.

3.16.2 Different Types of APIs

There are many different types of APIs for operating systems, applications or websites.

Windows, for example, has many API sets that are used by system hardware and

applications when you copy and paste text from one application to another, it is the API that

allows that to work.

Most operating environments, such as MS-Windows, provide APIs, allowing programmers

to write applications consistent with the operating environment. Today, APIs are also

specified by websites. For example, Amazon or eBay APIs allow developers to use the existing

retail infrastructure to create specialized web stores. Third-party software developers also

use Web APIs to create software solutions for end-users


3.17 MCC Architecture

MCC architecture as shown in fig which connects mobile devices to the cloud computing. The

MCC architecture includes a mobile client and a middleware design. There are two approaches to

implement the mobile client, native applications and embedded browser applications.

Native applications are built with specific programming languages supported by the mobile

platforms. However, embedded browser applications can run HTML and JavaScript in the

embedded browser and use interfaces exposed by native application.

The middleware improves interaction between mobile clients and cloud services, for example,

adaptation, optimization and caching. The middleware also provides extended functions to mobile

clients, such as service mash up. In general, the middleware enhances the functionality, reliability

and compatibility of the interaction between mobile clients and cloud services [9].

The goal of the MCC architecture is to provide a proxy for mobile clients connecting to cloud

services. The architecture consists of three parts, the mobile clients, the middleware and the cloud

services. Since Cloud services are usually controlled by service providers, the middleware

performs all the necessary adaptation to the mobile clients. Some services require real-time

updates, for example, news, Blog, and Twitter service.

The middleware also pushes updates of service results to mobile clients via HTTP or email

immediately after it receives the updates. The middleware is responsible for consuming the Cloud

Services whether they are SOAP or RESTful work station (WS) and delivers the service result to

the mobile client.

On the mobile client, users can define WS or mash up services and later execute the pre-defined

WS .The middleware provides a RESTful WS interface for the mobile clients. Figure 4.2 indicates
how to consume/execute a pre-defined WS. When WS are executed through the middleware, the

follow steps are involved in the middleware.

1. The mobile client sends a HTTP GET request with an identifier of a WS to the middleware.

2. The middleware deals with interactions to the WS (and generates SOAP WS client if

necessary).

3. The middleware extracts (JSON or XML parsing) the required service results from the

original service result and form a new service results in JSON format.

4. The middleware stores a copy of the result with the service ID in the database and returns

the optimized result to the mobile client

5. The middleware is also a personal service mashup platform (PSMP) that is based on a novel

data structure which represents WS as objects. The next section talks about the middleware

design and how these functions are achieved

3.17.1 MCC Loss of Connection

Client and middleware caching copies of result of the services are stored on both mobile clients

and the middleware. When the mobile clients are not able to connect to the middleware, the client

side cache is used. When the middleware to WS connection is not available, the middleware returns

its cached data to the mobile clients.

3.17.2 MCC Middleware Push

When the middleware receives an update of service result, it immediately sends the update to

mobile clients that are connected to the middleware. When the mobile clients detect an available

network connection, they automatically establish a connection to the middleware.


3.17.3 MCC Bandwidth/Latency

Protocol transformation reduces the latency as well as bandwidth of the client to service

interaction. The middleware transforms SOAP WS to RESTful WS. SOAP is a verbose protocol

which involves XML parsing, while RESTful WS can use light-weight format like JSON for the

message. Transferring SOAP WS to light-weight protocols, like RESTful WS, reduces processing

time as well as the size of the messages.

3.17.4 MCC Result Optimization

Result optimization reduces the size of the service results, thus reduces the bandwidth used to

interact with WS. The middleware converts the format of service results from XML to JSON and

removes unnecessary data from the original service result. Less data transferring also reduces

network latency.

3.17.5 MCC Personal Mashup Platform

Service mashup allow a mobile client to combine different services. However, service mashup

requires interaction with WS and processing power. Because of the resource limitation (energy,

processing power, software libraries) of 10 Mobile clients, it is inefficient to do service mashup

on the mobile clients.

The middleware provides a Personal Mashup Platform which does service mashup for the mobile

clients. The platform has generic interfaces for defining and consuming WS. The services are

stored on the middleware and can be connected to form a workflow (a mashup service) which

provides a possibility to caching intermediate service results [10].


3.18 Potential Problems

The most notable problem of the mobile computing is the lack of speedy mobile internet access

everywhere. In the US, for example, 3G coverage is spotty outside urban areas, leading to

intermittent connection issues and slow speeds. ABI Research mentions initiatives like OMA's

Smartcard Web Server, essentially a souped-up SIM card that connects directly with the carrier to

push applications to mobile phones.

There's also TokTok, a technology that allows access to web services like Gmail and Google

Calendar by voice. With voice-enabled search like this, mobile apps could talk directly to the

service itself which sits on the edge of the network, as opposed to needing the user to launch a web

browser and navigate through the mobile web. Other markets may have it even worse.

However, new technologies like HTML5, which does local caching, could help mobile cloud apps

get past those sorts of issues. And there's even a chance that the browser could one day be replaced

at least in some markets with another technology altogether which provides a better way to access

the mobile web [1].

3.18.1 Cheap Data and Data Analysis

The rise of cloud computing has created enormous data sets that can be monetized by applications

such as advertising. Google, for instance, leverages its cloud infrastructure to collect and analyze

consumer data for its advertising network. Collection and analysis of data is now possible cheaply.

Because of the cloud, attackers potentially have massive, centralized databases available for

analysis. How much more privacy did one have before one could be Googled?

Because of privacy concerns, enterprises running clouds collecting data have felt increasing

pressure to anonymize their data.


EPIC has called for Gmail, Google Docs, Google Calendar, and the company's other Web

applications to be shut down until appropriate privacy guards are available. Some identifying data

will be removed such as IP addresses and cookie information. The anonymized data is retained

though, to support the continual testing of their algorithms. Another reason to anonymize data is

to share data with other parties.

We note that anonymizing data is a difficult problem. as an ex, the Netflix data set was partially

de-anonym zed, and the then-Governor of Massachusetts was identified as a patient of

Massachusetts General Hospital from an anonymized list of discharged patients. Tools are needed

for effective anonymization, which will increase in importance as clouds proliferate and more data

is collected that needs to be analyzed safely or shared.

3.18.2 Cost-Effective Defense of Availability

Availability also needs to be considered for the sabotage activities. The damages are not only

related to the losses of productivity, but also extend to losses due to the degraded trust in the

infrastructure, and potentially costly backup measures.

The cloud computing model encourages single points of failure. It is therefore important to develop

methods for sustained availability and for recovery from an attack. The latter could operate on the

basis of minimization of losses, required service levels, or similar measures.

3.18.3 Increased Authentication Demands

A license purchased and software installation on the client side, users will authenticate in order to

be able to use a cloud application. There are some advantages in such a model, such as making

software piracy more difficult and giving the ability to centralize monitoring. It also may help

prevent the spread of sensitive data on untrustworthy clients.


Thin clients result in a number of opportunities related to security, including the paradigm. Their

security is managed by the cloud, which maintains the software they run. This architecture

stimulates the mobility of users, but increases the need to address authentication in a secure

manner.

In addition, the movement towards increased hosting of data and applications in the cloud and a

lesser reliance on specific user machines is likely to increase the threat of Phishing and other

abusive technologies aimed at stealing access credentials, or otherwise derive them, e.g., by brute

force methods [3].

3.18.4 Mash-Up Authorization

As adoption of cloud computing grows, we are likely to see more and more services performing

mash-ups of data. This development has potential security implications, both in terms of data leaks,

and in terms of the number of sources of data used by user. Centralized access control may solve

many of these problems that may not be possible


Chapter 4
The Future of Mobile Cloud Computing
4.7 Introduction

Mobile devices (e.g., smartphone and tablet PC) are increasingly becoming an essential part of

human life as the most effective and convenient communication tools not bounded by time and

place. Mobile users accumulate rich experience of various services from mobile applications

(e.g., iPhone apps and Google apps), which run on the devices and/or on remote servers via

wireless networks.

The rapid progress of MC becomes a powerful trend in the development of IT technology as well

as commerce and industry fields. However, the mobile devices are facing many challenges in their

resources (battery life, storage, and bandwidth) and communications (mobility and security).

The limited resources significantly impede the improvement of service qualities. CC has been

widely recognized as the next generation computing infrastructure. CC offers some advantages by

allowing users to use infrastructure (e.g., servers, networks, and storages), platforms (e.g.,

middleware services and operating systems), and software (e.g., application programs) provided

by cloud providers (e.g., Google, Amazon, and Salesforce) at low cost.

In addition, CC enables users to elastically utilize resources in an on-demand fashion. As a result,

mobile applications can be rapidly provisioned and released with the minimal management efforts

or service providers interactions. With the explosion of mobile applications and the support of

CC for a variety of services for mobile users, MCC is introduced as an integration of CC into the

mobile environment. MCC brings new types of services and facilities mobile users to take full

advantages of CC.
4.8 Mobile Computing Classification

Mobile computing is not only limited to mobile phones, but there are various gadgets available in

the market that are built on a platform to support mobile computing. They are usually classified in

the following categories

4.8.1 Personal Digital Assistant (PDA)

The main purpose of this device is to act as an electronic organizer or day planner that is portable,

easy to use and capable of sharing information with your computer systems.

PDA is an extension of the PC, not a replacement. These systems are capable of sharing

information with a computer system through a process or service known as synchronization. Both

devices will access each other to check for changes or updates in the individual devices. The use

of infrared and Bluetooth connections enables these devices to always be synchronized.

Fig 4.1: PDA

With PDA devices, a user can browse the internet, listen to audio clips, watch video clips, edit and

modify office documents, and many more services. The device has a stylus and a touch sensitive

screen for input and output purposes.


4.8.2 Smartphones

This kind of phone combines the features of a PDA with that of a mobile phone or camera phone.

It has a superior edge over other kinds of mobile phones.

Smartphones have the capability to run multiple programs concurrently. These phones include

high-resolution touch screens, web browsers that can access and properly display standard web

pages rather than just mobile-optimized sites, and high-speed data access via Wi-Fi and high speed

cellular broadband.

The most common mobile OS used by modern smartphones include Google's Android, Apple's

iOS, Nokia's Symbian, RIM's BlackBerry OS, Samsung's Bada, Microsoft's Windows Phone, and

embedded Linux distributions such as Maemo and MeeGo. Such operating systems can be

installed on different phone models, and typically each device can receive multiple OS software

updates over its lifetime.

Fig 4.2: Smartphones


4.8.3 Tablet PC and iPads

This mobile device is larger than a mobile phone or a PDA and integrates into a touch screen and

is operated using touch sensitive motions on the screen. They are often controlled by a pen or by

the touch of a finger. They are usually in slate form and are light in weight. Examples would

include ipads, Galaxy Tabs, Blackberry Playbooks etc.

Fig 4.3: Tablet PC and iPads

They offer the same functionality as portable computers. They support mobile computing in a far

superior way and have enormous processing horsepower. Users can edit and modify document

files, access high speed internet, stream video and audio data, receive and send e-mails, attend/give

lectures and presentations among its very many other functions. They have excellent screen

resolution and clarity.

4.9 Application of MCC

Mobile applications gain increasing share in a global mobile market. Various mobile applications

have taken the advantages of MCC. In this section, some typical MCC applications are introduced.
4.9.1 Mobile Commerce

Mobile commerce (m-commerce) is a business model for commerce using mobile devices. The m-

commerce applications generally fulfill some tasks that require mobility (e.g., mobile transactions

and payments, mobile messaging, and mobile ticketing). The m-commerce applications can be

classified into few classes including finance, advertising, and shopping.

The m-commerce applications have to face various challenges (e.g., low network bandwidth, high

complexity of mobile device configurations, and security). Therefore, m-commerce applications

are integrated into CC environment to address these issues.

4.9.2 Mobile learning

Mobile learning (m-learning) is designed based on electronic learning (e-learning) and mobility.

However, traditional m-learning applications have limitations in terms of high cost of devices and

network, low network transmission rate, and limited educational resources

Cloud-based m-learning applications are introduced to solve these limitations. For example,

utilizing a cloud with the large storage capacity and powerful processing ability, the applications

provide learners with much richer services in terms of data (information) size, faster processing

speed, and longer battery life.

4.9.3 Mobile Healthcare

The purpose of applying MCC in medical applications is to minimize the limitations of traditional

medical treatment (e.g., small physical storage, security and privacy, and medical errors).

Mobile healthcare (m-healthcare) provides mobile users with convenient helps to access resources

(e.g., patient health records) easily and efficiently.


Besides, m-healthcare offers hospitals and healthcare organizations a variety of on-demand

services on clouds rather than owning standalone applications on local servers. There are a few

schemes of MCC applications in healthcare.

1. Comprehensive health monitoring services enable patients to be monitored at anytime and

anywhere through broadband wireless communications.

2. Intelligent emergency management system can manage and coordinate the fleet of

emergency vehicles effectively and in time when receiving calls from accidents or

incidents.

3. Health-aware mobile devices detect pulse rate, blood pressure, and level of alcohol to alert

healthcare emergency system.

4.9.4 Mobile Gaming

Mobile game (m-game) is a potential market generating revenues for service providers. M-game

can completely offload game engine requiring large computing resource (e.g., graphic rendering)

to the server in the cloud, and gamers only interact with the screen interface on their devices.

4.10 Security Issues

Mobile computing has its fair share of security concerns as any other technology. Due to its

nomadic nature, it's not easy to monitor the proper usage. Users might have different intentions on

how to utilize this privilege. Improper and unethical practices such as hacking, industrial

espionage, pirating, online fraud and malicious destruction are some but few of the problems

experienced by mobile computing.

Another big problem plaguing mobile computing is credential verification. As other users share

username and passwords, it poses as a major threat to security. This being a very sensitive issue,
most companies are very reluctant to implement mobile computing to the dangers of

misrepresentation.

The problem of identity theft is very difficult to contain or eradicate. Issues with unauthorized

access to data and information by hackers, is also an enormous problem. Outsiders gain access to

steal vital data from companies, which is a major hindrance in rolling out mobile computing

services.

No company wants to lay open their secrets to hackers and other intruders, who will in turn sell

the valuable information to their competitors. It's also important to take the necessary precautions

to minimize these threats from taking place. Some of those measures include:-

1. Hiring qualified personnel.

2. Installing security hardware and software

3. Educating the users on proper mobile computing ethics

4. Auditing and developing sound, effective policies to govern mobile computing

5. Enforcing proper access rights and permissions

Fig 4.4: Security Application

These are just but a few ways to help deter possible threats to any company planning to offer

mobile computing. Since information is vital, all possible measures should be evaluated and

implemented for safeguard purposes.


In the absence of such measures, it's possible for exploits and other unknown threats to infiltrate

and cause irrefutable harm. These may be in terms of reputation or financial penalties. In such

cases, it's very easy to be misused in different unethical practices.

If these factors arent properly worked on, it might be an avenue for constant threat. Various threats

still exist in implementing this kind of technology.

4.11 Cloud Computing is the Future of Mobile Devices

The interface of MCC has undeniably enabled us to accommodate videos, music files, digital

images and more, right into out petite smart-phones. Here are a few reasons that explain why MCC

is considered to be the future for mobile devices:

Fig 4.5: MCC with Different Mobile Devices

4.11.1 Extended Battery Life

As the major role of processing is handled by the cloud, mobile devices battery usage is reduced

automatically.
4.11.2 Abundant Storage Space

Enormous storage capacity that a mobile user can access happens to be the most highlighted USP

of the cloud service. Mobile users shall no longer need to worry about their devices limited storage

capacity and spend money on memory cards.

4.11.3 Improved Data-Synching Techniques

Cloud storage enables the user to store and manage their data by speedy data synchronization

between the device and any other desktop or device chosen by the user. This instantly benefits the

users by eliminating their problems of storing all their data files and maintaining a back-up.

4.11.4 Enhanced Processing Facilities

The processor of any mobile device determines its speed and performance. However, in the case

of mobile cloud computing, most of the processing is performed at the cloud level. This takes the

load off the device and thereby enhances its overall performance.

4.11.5 Superior User-Experience

In case of MCC it is always the user who benefits the most by using this platform. The wide range

of benefits offered by this platform makes for an optimum productivity and an enhanced user-

experience.
4.11.6 Scope to Embrace New Technologies

MCC can easily adjust with the ever-evolving nature of technologies. It is capable enough to

perform efficiently with all the upgrades in cloud computing methods and changes in the smart-

phones designs and features.

4.12 MCC Current Trends

4.12.1 Third Generation 3G

3G or third generation mobile telecommunications is a generation of standards for mobile phones

and mobile telecommunication services fulfilling the International Mobile Telecommunications-

2000 (IMT-2000) specifications by the International Telecommunication Union. Application

services include wide-area wireless voice telephone, mobile Internet access, video calls and mobile

TV, all in a mobile environment.

4.12.2 Global Positioning System (GPS)

The Global Positioning System (GPS) is a space-based satellite navigation system that provides

location and time information in all weather, anywhere on or near the Earth, where there is an

unobstructed line of sight to four or more GPS satellites.

The GPS program provides critical capabilities to military, civil and commercial users around the

world. In addition, GPS is the backbone for modernizing the global air traffic system, weather, and

location services.

4.12.3 Long Term Evolution (LTE)

LTE is a standard for wireless communication of high-speed data for mobile phones and data

terminals. It is based on the GSM/EDGE and UMTS/HSPA network technologies, increasing the
capacity and speed using new modulation techniques. It is related with the implementation of

fourth Generation (4G) technology.

4.12.4 WiMAX

WiMAX (Worldwide Interoperability for Microwave Access) is a wireless communications

standard designed to provide 30 to 40 megabit-per-second data rates, with the latest update

providing up to 1 Gbit/s for fixed stations. It is a part of a fourth generation or 4G wireless-

communication technology.

WiMAX far surpasses the 30-metre wireless range of a conventional Wi-Fi Local Area Network

(LAN), offering a metropolitan area network with a signal radius of about 50 km. WiMAX offers

data transfer rates that can be superior to conventional cable-modem and DSL connections,

however, the bandwidth must be shared among multiple users and thus yields lower speed in

practice.

4.12.5 Near Field Communication

Near Field Communication (NFC) is a set of standards for smartphones and similar devices to

establish radio communication with each other by touching them together or bringing them into

close proximity, usually no more than a few centimeters. Present and anticipated applications

include contactless transactions, data exchange, and simplified setup of more complex

communications such as Wi-Fi. Communication is also possible between an NFC device and an

unpowered NFC chip, called a "tag".


Chapter 5
Conclusion
Conclusion

Today's computing has rapidly grown from being confined to a single location. With mobile

computing, people can work from the comfort of any location they wish to as long as the

connection and the security concerns are properly factored. In the same light, the presence of high

speed connections has also promoted the use of mobile computing.

Being an ever growing and emerging technology, mobile computing will continue to be a core

service in computing, and information and communications technology.

MCC is one of the mobile technology trends in the future, because it combines the advantages of

both MC and CC, thereby providing optimal services for mobile users. That traction will push the

revenue of MCC to $5.2 billion. With this importance, this article has provided an overview of

MCC in which its definitions, architecture, and advantages have been presented.

The applications supported by MCC including m-commerce, m-learning, and mobile healthcare

have been discussed which clearly show the applicability of the MCC to a wide range of mobile

services.

Then, the issues and related approaches for MCC (i.e., from communication and computing sides)

have been discussed. Finally, the future research directions have been outlined.
References

1. Satyanarayanan M. Proceedings of the 1st ACM Workshop on Mobile Cloud Computing

& Services: Social Networks and Beyond (MCS), 2010.

2. Satyanarayanan M. Fundamental challenges in mobile computing, In Proceedings of the

5th annual ACMsymposium on Principles of distributed computing, 1996; 17.

3. Ali M. Green cloud on the horizon, In Proceedings of the 1st International Conference on

Cloud Computing (CloudCom), Manila, 2009; 451459.

4. http://www.mobilecloudcomputingforum.com/.

5. White Paper. Mobile Cloud Computing Solution Brief. AEPONA, 2010.

6. Christensen JH. Using RESTful web-services and cloud computing to create next

generation mobile applications, In Proceedings of the 24th ACM SIGPLAN conference

companion on Object oriented programming systems languages and applications

(OOPSLA), 2009; 627634.

7. Liu L, Moulic R, Shea D. Cloud service portal for mobile device management, In

Proceedings of IEEE 7th International Conference on e-Business Engineering (ICEBE),

2011; 474.

8. Foster I, Zhao Y, Raicu I, Lu S. Cloud computing and grid computing 360-degree

compared, In Proceedings of Workshop on Grid Computing Environments (GCE), 2009

9. Calheiros RN, Vecchiola C, Karunamoorthy D, Buyya R. The Aneka platform and QoS-

driven resource provisioning for elastic applications on hybrid Clouds. Future Generation

Computer Systems, to appear.


10. Buyya R, Yeo CS, Venugopal S, Broberg J, Brandic I. Cloud computing and emerging IT

platforms: vision, hype, and reality for delivering computing as the 5th utility. Journal on

Future Generation Computer Systems 2009; 25(6): 599616.

11. Huang Y, Su H, Sun W, et al. Framework for building a low-cost, scalable, and secured

platform for web delivered business services. IBM Journal of Research and Development

2010; 54(6): 535548.

12. Tsai W, Sun X, Balasooriya J. Service-oriented cloud computing architecture, In

Proceedings of the 7th International Conference on Information Technology: New

Generations (ITNG), 2010; 684689.

13. Kakerow R. Low power design methodologies for mobile communication, In Proceedings

of IEEE International Conference on Computer Design: VLSI in Computers and

Processors, 2003; 8.

14. Paulson LD. Low-power chips for high-powered handhelds. IEEE Computer Society

Magazine 2003; 36(1): 21.

15. Davis JW. Power benchmark strategy for systems employing power management, In

Proceedings of the IEEE International Symposium on Electronics and the Environment,

2002; 117.

16. Mayo RN, Ranganathan P. Energy consumption in mobile devices: why future systems

need requirements aware energy scale-down, In Proceedings of the Workshop on Power-

Aware Computing Systems, 2003.

17. Smailagic A, EttusM. System design and power optimization for mobile computers, In

Proceedings of IEEE Computer Society Annual Symposium on VLSI, 2002; 10.


18. Cuervo E, Balasubramanian A, Dae-ki C, et al. MAUI: making smartphones last longer

with code offload, In Proceedings of the 8th International Conference on Mobile systems,

applications, and services, 2010; 4962.

19. Vartiainen E, Mattila KV-V. User experience of mobile photo sharing in the cloud, In

Proceedings of the 9th International Conference on Mobile and Ubiquitous Multimedia

(MUM), 2010.

20. http://www.shozu.com/portal/index.do.

21. Garcia A, Kalva H. Cloud transcoding for mobile video content delivery, In Proceedings

of the IEEE International Conference on Consumer Electronics (ICCE), 2011; 379.

22. Kumar K, Lu Y. Cloud computing for mobile users: can offloading computation save

energy. IEEE Computer Society 2010; 43(4).

S-ar putea să vă placă și