Escolar Documentos
Profissional Documentos
Cultura Documentos
UNIT I
1. Cellular Wireless Networks:
Importance of Wireless
Freedom of movement
No loss of connectivity
Increase in productivity
/
k
t
.
e
b
u
t
e
s
c
/
control unit
/
:
p
t
t
Frequencyh
Reuse
http://csetube.weebly.com/
Cellular System
Overview
/
k
t
.
e
b
u
t
e
receivers
s
c
/
/
:
p
t
t
h
2. GSM
formerly: Groupe Spciale Mobile (founded 1982)
now: Global System for Mobile Communication
Pan-European standard (ETSI, European Telecommunications
Standardisation Institute)
http://csetube.weebly.com/
/
k
t
.
e
b
u
t
e
s
c
/
/
:
p
t
t
h
Disadvantages of GSM
There is no perfect system!!
no end-to-end encryption of user data
no full ISDN bandwidth of 64 kbit/s to the user, no transparent B-channel
reduced concentration while driving
electromagnetic radiation
abuse of private data possible
roaming profiles accessible
high complexity of the system
several incompatibilities within the GSM standards
GSM: Mobile Services
GSM offers
several types of connections
http://csetube.weebly.com/
bearer
services
transit
network
(PSTN,
ISDN)
GSM-PLMN
MT
R,
S
source/
destination
network
TE
(U, S,
R)
Bearer Services
/
k
t
.
e
b
u
t
e
s
c
/
/
:
p
t
t
h
http://csetube.weebly.com/
radio
cell
M
M
S
S
BS
S
radio
cell
M
S
RS
S
B
T
S
B
T
S
Abi
s
B
S
C
NS
S
B
S
C
VL
R
M
S
C
HL
R
VL
R
OS
S
.
e
b
tu
se
c
/
/
O
M
S
C
G
M IW
S F
C
/
k
t
signali
ng
ISDN,
PSTN
PD
N
:
p
t
EI
R
A
O
U
M
C
C
4. GSM protocol layers for signaling
ht
http://csetube.weebly.com/
Um
Abis
M
S
BT
S
BS
C
MS
C
CM
CM
MM
MM
RR
LAPD m
RR
LAPD m
radio
radio
RR
BTS
MLAPD
BT
LAPD
SM
PCM
PCM
16/64
kbit/s
5. CONNECTION ESTABLISHMENT
BS
SA
SS7
P
BSSA
P
SS7
PCM
PCM
.
e
b
/
k
t
64 kbit/s /
2.048
Mbit/s
u
t
e
s
c
/
/
:
p
t
t
h
http://csetube.weebly.com/
HLR
4
5
3 6
calling
statio
n
PSTN
GMS
C
VLR
8 9
14 15
MSC
10
10 13
16
10
BSS
BSS
BSS
11
11
11
11 12
17
/
k
t
.
e
b
u
t
e
s
c
/
/
:
p
t
t
h 6
PSTN
MS
VLR
3 4
5
GMS
C
MSC
8
2 9
MS
1
10
BSS
7.FREQUENCY ALLOCATION
http://csetube.weebly.com/
Frequency Ranges
coax cable
twisted
pair
1 Mm
300
Hz
10 km
30 kHz
VLF
LF
optical transmission
100 m
3 MHz
MF
HF
1m
300 MHz
10 mm
30 GHz
VHF
SHF
UHF
1 m
300
THz
EHF
100
m
3 THz
infrare
d
visible
light
U
V
/
k
t
.
e
b
u
t
e
s
c
/
/
:
p
t
t
h
Frequencies
http://csetube.weebly.com/
/
k
t
Europe
Cellular
Phones
cs
/
/
:
p
t
t
Cordless
Phones
Wireless
LANs
Others
u
t
e
USA
.
e
b
Japan
PDC
810-826,
940-956,
1429-1465,
1477-1513
PHS
1895-1918
JCT
254-380
902-928
IEEE 802.11
2400-2483
5150-5350, 5725-5825
IEEE 802.11
2471-2497
5150-5250
RF-Control
315, 915
RF-Control
426, 868
http://csetube.weebly.com/
8.ROUNTING
Routing :Routing is the means of discovering paths in computer networks along which
information (split up into packets) can be sent. Circuit-based networks, such as the
voice telephone network, also perform routing, to find paths for telephone calls
through the network fabric.
Routing is usually directed by routing tables, which maintain a record of the best
routes to various network locations in order to keep up with the packet arrival rate.
Small networks may involve hand configuration. Large networks involve complex
topologies and may change constantly, making the constructing of routing tables
very problematic. Automatic routing protocols attempt to solve this problem with
dynamically updated routing tables. These are updated intermittently by the routing
software, based on information carried by the routing protocol, and allow the network
to be nearly autonomous in avoiding network failures and blockages.
/
k
t
.
e
b
Routing directs forwarding, the passing of logically addressed packets from their
local sub network toward their ultimate destination. In large networks, packets may
pass through many intermediary destinations before reaching their destination.
u
t
e
s
c
/
/
:
p
The concept of link abstraction ie. considering the two connected nodes as a link is
not valid in the case of wireless as opposed to the wired systems. This is for the
following reasons
t
t
h
NOTE : 2P MAC reduces the differences between wireless and wired networks It has directional, point to point links, hence the thing comes close to wired.
http://csetube.weebly.com/
/
k
t
.
e
b
u
t
e
s
c
/
/
:
p
RTT:
Since this value is congestion dependent this value needs to be calculated again
and again. Probe and Probe Ack are sent between the two neighbours every 500 ms
to calculate the Round Trip Time.
t
t
h
9. Security in GSM
Security services
access control/authentication
user SIM (Subscriber Identity Module): secret PIN
(personal identification number)
SIM network: challenge response method
confidentiality
voice and signaling encrypted on the wireless link
(after successful authentication)
http://csetube.weebly.com/
anonymity
temporary identity TMSI
(Temporary Mobile Subscriber Identity)
newly assigned at each new location update (LUP)
encrypted transmission
3 algorithms specified in GSM
A3 for authentication (secret, open interface)
A5 for encryption (standardized)
A8 for key generation (secret, open interface)
10.General Packet Radio Service (GPRS)
New service that uses packet-mode to transfer data over GSM radio
networks.
Supplements todays Short Message Service (SMS) and Circuit Switched
Data Service (CSDS).
Packets are in IP formats (but can carry other packet data protocol such
as X.25).
Since it is built on top of the current GSM network and can run several
times faster, it is considered a migration path to 3G (up to 2 Mbps)
TDMA (Time Division Multiple Access) popular in North and South
America will also support GPRS
Can use up to 8 time slots per TDMA frame
Theoretical maximum speed is 171.2 Kbps
Commercial performance will probably be somewhere between 56K to
115Kbps
Initial speeds are from 20K to 40Kbps (GSM CSD runs at 9.6Kbp)
By reserving timeslots for a connection, quality of service can be provided
effective utilization of bandwidth
instant connection (no dial-up modem connection is necessary) - always
connected
charging based on amount of data transferred, not connection time
Internet aware - services available to the Internet (such as FTP, web
browsing, email, chat, telnet) will be available over the the mobile network
via GPRS
allows SMS transfer over GPRS radio channels
addresses to send and receive GPRS packets is likely to be IP addresses
rather than phone numbers
Launched in the UK in summer 2000
Expected to be publicly available in HK in Fall 2001
/
k
t
.
e
b
u
t
e
s
c
/
/
:
p
t
t
h
Quality of service
http://csetube.weebly.com/
Reliability
class
Lost SDU
probability
Duplicate
SDU
probability
1
2
3
10-9
10-4
10-2
10-9
10-5
10-5
Delay
class
1
2
3
4
Out of
sequence
SDU
probability
10-9
10-5
10-5
Corrupt SDU
probability
10-9
10-6
10-2
/
k
t
.
e
b
u
t
e
SGS
N
cs
BSS
M
S
/
/
:
p
t
t
G
n
SGS
N
PDN
GGS
N
MSC
VLR
HLR/
GR
EIR
http://csetube.weebly.com/
MS
BSS
Um
SGSN
Gb
Gn GGSN
Gi
apps.
IP/X.25
IP/X.25
SNDCP
GTP
LLC
RLC
MAC
RL
MAC
C
radio
radio
SN
DC
LLC
P
BSSGP
UDP/T
GT
CP
P
IP
UDP/T
CP
IP
FR
L1/L2
L1/L2
BS
FR
SG
P
/
k
t
.
e
b
u
t
e
UNIT II
1. Wireless LANs
s
c
/
/
:
p
t
t
h
Advantages
http://csetube.weebly.com/
/
k
t
.
e
b
u
t
e
security (no one should be able to read my data), privacy (no one should
be able to collect user profiles), safety (low radiation)
s
c
/
/
:
p
t
t
h
http://csetube.weebly.com/
SYSTEM ARCHITECTURE
Station (STA)
- terminal with access mechanisms to the wireless medium and radio contact
to the access point
Basic Service Set (BSS)
- group of stations using the same radio frequency
Access Point
- station integrated into the wireless LAN and the distribution system
Portal
- bridge to other (wired) networks
Distribution System
/
k
t
.
e
b
u
t
e
s
c
/
/
:
p
t
t
h
http://csetube.weebly.com/
802.11
LAN
STA1
802.x
LAN
BSS1
Porta
l
Acce
ss
Distribution
Point
System
Acce
ss
ES
S
.
e
b
Point
BSS2
/
k
t
u
t
e
s
c
/
STA2
STA3
/
:
p
t
t
h
http://csetube.weebly.com/
802.11
LAN
STA1
BSS1
STA3
STA2
/
k
t
.
e
b
BSS2
uSTA
t
e
STA4
s
c
/
802.11
LAN
/
:
p
t
t
h
IEEE standard 802.11
http://csetube.weebly.com/
fixed
terminal
mobile
terminal
serve
r
infrastructure
network
access
point
application
application
TCP
TCP
IP
IP
LLC
LLC
802.11 MAC
802.11
MAC
802.11
PHY
802.11 PHY
LLC
/
k
t
802.3 MAC
802.3 PHY
802.3 MAC
.
e
b
802.3 PHY
u
t
e
s
c
/
MAC
/
:
p
t
t
h
http://csetube.weebly.com/
D
L
C
P
H
Y
MAC
MAC Management
PLCP
PHY Management
PMD
Station Management
LLC
/
k
t
.
e
b
u
t
e
s
c
/
/
:
p
t
t
h
Synchronization
http://csetube.weebly.com/
8
0
synchronization
1
6
SFD
1
2
PLW
PLCP
preamble
1
6
HEC
PSF
variabl
epayload
/
k
t
bit
s
.
e
b
PLCP
header
u
t
e
s
c
/
/
:
p
Synchronization
t
t
h
1111001110100000
Signal
data rate of the payload (0A: 1 Mbit/s DBPSK; 14: 2 Mbit/s DQPSK)
Service
Length
future use, 00: 802.11 compliant
16
16
16
SFD
signa
l
servi
ce
lengt
h
HEC
PLCP preamble
variable
payload
PLCP header
http://csetube.weebly.com/
bits
/
k
t
.
e
b
u
t
e
s
c
/
/
:
p
t
t
h
http://csetube.weebly.com/
DIFS
DIFS
PIFS
SIFS
medium busy
contention
next frame
t
direct access if
medium is free DIFS
/
k
t
station ready to send starts sensing the medium (Carrier Sense based on
.
e
b
if the medium is free for the duration of an Inter-Frame Space (IFS), the
u
t
e
s
c
/
/
:
p
if another station occupies the medium during the back-off time of the
t
t
h
HiperLAN
http://csetube.weebly.com/
Bluetooth
Idea
Universal radio interface for ad-hoc wireless connectivity
Interconnecting computer and peripherals, handheld devices, PDAs, cell
phones replacement of IrDA
Embedded in other devices, goal: 5/device (2005: 40/USB bluetooth)
Short range (10 m), low power consumption, license-free 2.45 GHz ISM
Voice and data transmission, approx. 1 Mbit/s gross data rate
/
k
t
.
e
b
u
t
e
s
c
/
Characteristics
/
:
p
t
t
h
http://csetube.weebly.com/
/
k
t
.
e
b
u
t
e
s
c
/
/
:
p
t
t
h
http://csetube.weebly.com/
UNIT III
1.Mobile IP
Motivation for Mobile IP
Routing
based on IP destination address, network prefix (e.g. 129.13.42)
determines physical subnet
change of physical subnet implies change of IP address to have a
topological correct address (standard IP) or needs special entries in
the routing tables
/
k
t
.
e
b
destination
u
t
e
does not scale with the number of mobile hosts and frequent
changes in the location, security problems
s
c
/
/
:
p
t
t
h
Requirements:
Transparency
mobile end-systems keep their IP address
continuation of communication after interruption of link possible
point of connection to the fixed network can be changed
Compatibility
support of the same layer 2 protocols as IP
no changes to current end-systems and routers required
http://csetube.weebly.com/
Security
authentication of all registration messages
/
k
t
Terminology
.
e
b
u
t
e
s
c
/
/
:
Foreign Agent (FA)
p
t
ht
http://csetube.weebly.com/
Security
authentication with FA problematic, for the FA typically belongs to
another organization
no protocol for key management and key distribution has been
standardized in the Internet
patent and export restrictions
Firewalls
typically mobile IP cannot be used together with firewalls, special
set-ups are needed (such as reverse tunneling)
QoS
/
k
t
.
e
b
u
t
e
s
c
/
/
:
p
t
t
h
Security in Mobile IP
http://csetube.weebly.com/
Application
/
k
t
.
e
b
u
t
e
computers
s
c
/
/
:
p
t
t
h
Client/Server-Model
the client sends via a MAC broadcast a request to the DHCP server
(might be via a DHCP relay)
DHCP characteristics
Server
several servers can be configured for DHCP, coordination not yet
standardized (i.e., manual configuration)
Renewal of configurations
IP addresses have to be requested periodically, simplified protocol
http://csetube.weebly.com/
Options
available for routers, subnet mask, NTP (network time protocol)
timeserver, SLP (service location protocol) directory,
DNS (domain name system)
/
k
t
.
e
b
u
t
Standard Mobile IP needs an infrastructure
e
s
c
/
/
:
Sometimes there is no infrastructure!
p
t
ht
Home Agent/Foreign Agent in the fixed network
DNS, routing etc. are not designed for mobility
Distance Vector
periodic exchange of messages with all physical neighbors that
contain information about who can be reached at what distance
http://csetube.weebly.com/
Link State
periodic notification of all routers about the current state of all
physical links
router get a complete picture of the network
Example
ARPA packet radio network (1973), DV-Routing
every 7.5s exchange of routing tables including link quality
updating of tables also by reception of packets
routing problems solved with limited flooding
/
k
t
.
e
b
u
t
e
s
c
/
/
:
p
t
t
h
Iff node v can hear node u, the graph has an arc (u,v)
These arcs can have weights that represent the signal strength
Close-by nodes have MAC issues such as hidden/exposed terminal problems
Optional: links are symmetric
Optional: the graph is Euclidian, i.e., there is a link between two
nodes iff the distance d of the nodes is less than D
http://csetube.weebly.com/
Example:
ARPA packet radio network (1973), DV-Routing
Every 7.5 s exchange of routing tables including link quality
Updating of tables also by reception of packets
/
k
t
.
e
b
u
t
e
s
c
/
/
:
p
t
t
h
Limited bandwidth of the system is reduced even more due to the exchange of
routing information
.. Key problem:
Protocols have been designed for fixed networks with infrequent changes and
typically assume symmetric links!
Early work:
http://csetube.weebly.com/
/
k
t
5.Multicast Routing
.
e
b
u
t
e
s
c
/
/
:
p
t
t
h
One to Many
Video Distribution
Wide scale Information dissemination.
Many to Many
Video Conferencing
Computer Supported Common Work.
Distributed interactive simulation.
Large scale distributed (super)computing.
http://csetube.weebly.com/
Distributed Games
Advantages.
SRSPTs are easy to compute. Use the classic unicast routing tables.
Efficient distributed implementations are possible
Entire global topology not required.
There can be no loops in the path returned.
/
k
t
.
e
b
Disadvantages
Does not minimize total cost of distribution
u
t
e
One piece of state information per source and per group is kept in each router.
s
c
/
/
:
p
UNIT IV
t
t
h
1.Mobile TCP
Supervisory host
no caching, no retransmission
monitors all packets, if disconnection detected
set sender window size to 0
http://csetube.weebly.com/
Advantages
maintains semantics, supports disconnection, no buffer forwarding
Disadvantages
loss on wireless link propagated into fixed network
adapted TCP on wireless link
Goals
/
k
t
.
e
b
u
t
e
s
c
/
/
:
p
Platforms
t
t
h
e.g., GSM (900, 1800, 1900), CDMA IS-95, TDMA IS-136, 3rd
generation systems (IMT-2000, UMTS, W-CDMA)
Forum
WAP Forum, co-founded by Ericsson, Motorola, Nokia, Unwired
Planet
http://csetube.weebly.com/
Browser
micro browser, similar to existing, well-known browsers in the
Internet
Script language
similar to Java script, adapted to the mobile environment
WTA/WTAI
Wireless Telephony Application (Interface): access to all telephone
functions
Content formats
/
k
t
.
e
b
Protocol layers
transport layer, security layer, session layer etc.
u
t
e
Working Groups
s
c
/
/
:
p
t
t
h
http://csetube.weebly.com/
/
k
t
.
e
b
WWW example
u
t
e
Request to port 80
GET / HTTP/1.0
s
c
/
/
:
p
HTTP/1.1 200 OK
t
t
h
Server: Apache/1.3b5
Connection: close
Content-Type: text/html
<HTML>
<HEAD>
<TITLE> Institut für Telematik</TITLE>
</HEAD>
<BODY BGCOLOR="#ffffff">
<img src="icons/uni/faklogo_de.gif"
ALT=" [Universität Karlsruhe, Fakultät
für Informatik] ">
http://csetube.weebly.com/
Goals of WDP
create a worldwide interoperable transport system with the help of
/
k
t
.
e
b
u
t
e
s
c
/
Goals
/
:
p
data integrity
t
t
h
prevention of tapping
authentication
WTLS
is based on the TLS (Transport Layer Security) protocol (former
SSL, Secure Sockets Layer)
optimized for low-bandwidth communication channels
http://csetube.weebly.com/
Goals
different transaction services, offloads applications
application can select reliability, efficiency
support of different communication scenarios
class 0: unreliable message transfer
class 1: reliable message transfer without result message
class 2: reliable message transfer with exactly one reliable result message
supports peer-to-peer, client/server and multicast applications
/
k
t
.
e
b
u
t
e
selective retransmission
header compression
s
c
/
/
:
p
Goals
t
t
h
Services
session management (establish, release, suspend, resume)
capability negotiation
content encoding
WSP/B (Browsing)
http://csetube.weebly.com/
Goals
network independent application environment for low-bandwidth,
wireless devices
integrated Internet/WWW programming model with high interoperability
/
k
t
Requirements
.
e
b
u
t
e
s
c
/
Components
/
:
p
t
t
h
http://csetube.weebly.com/
Example
calling a number (WML)
wtai://wp/mc;07216086415
calling a number (WMLScript)
WTAPublic.makeCall("07216086415");
/
k
t
.
e
b
u
t
e
s
c
/
/
:
p
Features
t
t
h
context management
WML example
<WML>
<CARD>
<DO TYPE="ACCEPT">
<GO URL="#card_two"/>
</DO>
http://csetube.weebly.com/
/
k
t
</WML>
.
e
b
12. WMLScript
Complement to WML
s
c
/
Features
u
t
e
/
:
p
t
t
h
function pizza_test(pizza_type) {
var taste = "unknown";
http://csetube.weebly.com/
if (pizza_type = "Margherita") {
taste = "well... ";
}
else {
if (pizza_type = "Vulcano") {
taste = "quite hot";
};
};
return taste;
};
/
k
t
.
e
b
u
t
e
s
c
/
/
:
p
t
t
h
Unit V
http://csetube.weebly.com/
1.Pervasive Computing
Pervasive computing is the third wave of computing
technologies to emerge since computers first
appeared:
First Wave - Mainframe computing era: one computer
shared by many people, via workstations.
Second Wave - Personal computing era: one
computer used by one person, requiring a conscious
interaction. Users largely bound to desktop.
Third Wave Pervasive (initially called ubiquitous)
/
k
t
.
e
b
u
t
e
Pervasive Environment
s
c
/
/
:
p
t
t
h
http://csetube.weebly.com/
Evolution
/
k
t
Distributed Computing
.
e
b
u
t
e
Mobile Computing
The appearance of full- function laptop computers and wireless LANs in the
s
c
/
early 1990s led researchers to confront the problems that arise in building a distributed
/
:
p
system with mobile clients. The field of mobile computing was thus born.
t
t
h
Pervasive Architecture
http://csetube.weebly.com/
Device Technology
Hardware
Battery
Displays
Memory
Processors
Interfaces
Keyboards
HARDWARE - Battery
.
e
b
12-27
85-160
NiMH
16-37
110-210
Li ion
21-50
170-225
Hardware-Displays
/
k
t
u
t
e
s
c
/
/
:
p
t
t
h
http://csetube.weebly.com/
Hardware-Memory
Memory is becoming cheaper, while the demand from applications is growing.
Development is driven in part by smart phones, digital cameras, MP3 players and
PDAs.
For these mobile devices, the currently available technologies and their associated costs
have reached a point where it is now feasible to integrate several megabytes of memory
into a mobile device with an acceptable form factor.
On PCs, permanent data can be stored on hard disk drives.
For mobile devices, this is often not an option because neither the space nor the power
supply is available.
Recently, extremely small removable disk drives like the IBM Microdrive became
/
k
t
available.
Their capacity ranges between 340 MB and 1 GB, and is sufficient to store, for
.
e
b
u
t
e
Hardware-Processors
s
c
/
During the last couple of years, the clock rate of microprocessors and the processing
power available from them has increased steadily.
/
:
p
t
t
h
At the same time, the processor core voltage was low-ered from the industry standard
3.3 V in 1995 to 1.35 V in 2000.
This means lower heat emissions, which in turn paves the way for new improvements
like larger on-die caches.
This, together with advances in packaging technologies, delivers the modern Central
Processing Units (CPUs) found in mobile computers and PDAs today.
Hardware-Human-machine interfaces
Like their PC predecessors, many mobile devices also use keyboards and displays to
interface with their users.
http://csetube.weebly.com/
However, these are usually much smaller and specialized for the application and the
form factor of particu-lar devices.
Phones, for example, tend to have only number keys, plus a few extra keys for the builtin menus.
This is because the size of the device is important and because users enter less text than
on a PC.
Other devices try to limit the number of mechanical keys to an absolute mini- mum,
using them only to trigger the most important applications and for menu navigation.
An example is the PDA.
Finally, there are devices that have no means of display or keyboard whatsoever.
These so-called head-less devices are most often used as controllers and interface only
/
k
t
to other devices.
.
e
b
Hardware-Human-machine interfaces
u
t
e
When reaching a haptic mark, the user feels a resistance generated by the motor against
s
c
/
/
:
p
When the knob passes that position, the force gets smaller again.
This can be used to create the impression of a knob that can be put into a programmable
t
t
h
number of positions.
It allows a single knob to be used for navigating through a menu structure where each
menu choice is represented by one position.
Biometrics
Definition
Biometrics is the science of verifying and establishing the identity of an
individual
through physiological features or behavioral traits.
Examples
http://csetube.weebly.com/
o Physical Biometrics
Fingerprint
Hand Geometry
Iris patterns
o Behavioral Biometrics
Handwriting
Signature
Speech
Gait
o Chemical/Biological Biometrics
Perspiration
Skin composition(spectroscopy)
/
k
t
.
e
b
Advantages of biometrics
u
t
e
Uniqueness
s
c
/
/
:
p
t
t
h
Software-Operating systems
The core functionality of every pervasive computing device is determined by its
operating system.
The major differences of operating systems for pervasive devices from the user's point
of view are the human-machine interface, and the speed with which a task can be
performed.
For pervasive devices, there will likely be no equivalent to the Windows/Intel
monopoly in the near future because pervasive devices do have a wide range of usages
(from mobile phones to set-top boxes) with very con-strained hardware.
http://csetube.weebly.com/
There are two trends visible for pervasive computing operating systems.
For personal use, the two major PDA operating systems, Palm OS and Windows CE,
are becoming more similar, and can integrate phone functionality in a new device that
combines a PDA with a cell phone.
For home use, the development is directed towards high-performance multimedia
operating systems, such as embedded Linux or BeOS.
Security
Issues in biometrics
o Biometrics is secure but not secret
/
k
t
.
e
b
u
t
e
Types of circumvention
o Denial of service attacks(1)
s
c
/
/
:
p
t
t
h
o Collusion
o Coercion
Fingerprints
Minutiae: Local anomalies in the ridge flow
Pattern of minutiae are unique to each
Individual
http://csetube.weebly.com/
/
k
t
.
e
b
Ideally, Web applications that support pervasive computing should adapt to whatever
u
t
e
Applications must provide content in a form that is appropriate for the user's particular
s
c
/
device - WML for WAP phones, Voice XML for voice interaction via a voice browser,
HTML for PCs, and so on.
/
:
p
t
t
h
http://csetube.weebly.com/
Both issues can be resolved by system topologies that employ parallelism and
redundancy to guarantee scalability and availability.
/
k
t
As devices are very different from each other, we can assume that one controller will fit
all device classes. In the MVC pattern the controller encapsulates the dialog flow of an
.
e
b
application.
u
t
e
This flow will be different for different classes of devices, such as WAP phone, voiceonly phones, PCs, or PDAs.
s
c
/
/
:
p
dispatcher that invokes the appropriate controller depending on the type of device being
used
t
t
h
http://csetube.weebly.com/