42-MobComp

download 42-MobComp

of 8

Transcript of 42-MobComp

  • 8/6/2019 42-MobComp

    1/8

    New Trends in Mobile Computing Architecture

    Antnio Miguel Cruz

    Dep. Informtica, Universidade do Minho4710 - 057 Braga, Portugal

    [email protected]

    Abstract. The increasing nomadicity of our society places new challenges to the hardware

    design of mobile computers. This communication introduces the subject and identifies the main

    requirements of mobile stations, namely portability, mobility and wireless communications. It

    then focuses on the architectural issues of these mobile computers with a brief overview on the

    main features of Digital Signal Processors for control signalling in mobile digital networks.

    1 Introduction

    Research in wireless networking technology has allowed portable computers to be

    equipped with wireless interfaces, enabling networked communication to take place while

    mobile. This lead to an enormous increase of productivity to those professionals that need

    to be constantly moving while requiring connection to the companys server. An example is

    the expert from an assurance company that connects to his companys database server,

    from his notebook computer, using his mobile phone (GSM enabled handset). This makes

    possible for that expert to give an answer to his client, accepting or not the garages budget.

    This type of nomad teleworking has been called mobile computing, which should not be

    confused with portable computing. In mobile computing and networking, applications are

    not interrupted when the user changes the computers point of attachment to the network.

    Instead, all the needed reconnection occurs automatically and without human intervention

    [1].

    Mobile Computing is a new paradigm of computing where mobile computers have

    access to a wireless network, independently of their current location. The required tasks to

    adapt to the environment conditions can be included into the operating system, such as in

    Coda [2], or both the operating system and the application, such as in Odissey application-

    aware adaptation [3].

    This communication will address mobile computers as computing devices that connect

    to a server or to the Internet from anywhere in the world, provided that its location iscovered by a similar digital radio network. These devices may be notebooks, handheld

    computers (PDA), or systems embedded in automobiles with integrated wireless data

    communications, or mobile phones with computing capabilities (PDA/cell phone

    combination) such as the Nokia Communicator; or they may also include wearable

    computers, such as the Matchbox PC [4].

    The requirements for mobile computing can be included into three main groups [5]:

    Portability. With desktop PCs, the main development trend has been the

    execution performance, while keeping the size. For mobile computing are needed

    machines that are small, lightweight and have battery autonomy, so that they can

    be truly mobile. Thus, there is aportability requirementthat imposes constraints in

    the use of space, power, cabling and heat dissipation.

    1

  • 8/6/2019 42-MobComp

    2/8

    Mobility. The ability to change locations while connected to a network places a

    mobility requirement, in the sense that data must be valid, independently of the

    point of access to the network. This also requires that the access to location

    dependent information should be sensitive to the network access point of the

    mobile computer. A mobile computer also needs a mechanism to know which

    server to use, depending on its location.

    Wireless communication. In wireless communication the surrounding

    environment interacts with the signal, blocking its path or introducing distortion

    and noise. Wireless connections have lower quality than wired connections: lower

    bandwidth, higher error rates and more frequent unwanted network disconnection.

    The next sections discuss the three classes of requirements for mobile computing. In

    section 5, an overview on Digital Signal Processors (DSP), that are used to control

    signalling in digital networks, will be given.

    2 Portability requirements

    Two types of computers for mobility can be considered:

    Computers that have the same functionality as desktop computers, such as

    notebooks;

    Computers that gave up some functionality, so that they can be shrunk to fit in a

    pocket, such as handheld computers or PDA/cell phone combinations.

    In the near future, the wireless data market will continue to be dominated by

    notebooks [6], because notebook users need more connectivity than handheld users do, as

    they run more powerful programs and more communication demanding applications, such

    as mobile client/server applications.

    Mobile computers differ from desktop computers in some aspects, such as size, weight

    and power autonomy. The technological trends to meet this constraints are [7],[8]:

    At the hardware level:

    embedding code within the system, allowing it to slow down, suspend or

    shutdown part or all of the system platform; advances in microelectronics;

    increasing code density;

    higher peripheral integration.

    At the hardware/software level:

    let the operating system (OS) to have control over the power management.

    2.1 Embedding code within the system to manage power consumption

    This technology was first introduced by Intel with its processor 386SL. The SL technology,

    2

  • 8/6/2019 42-MobComp

    3/8

    still present in todays Pentiums, consists in embedding code within the BIOS of the CPU,

    allowing it to slow down, suspend or shutdown part or all of the system platform, including

    the CPU itself, enabling an effective power management in order to extend battery life,

    thus increasing computers autonomy [7]. The Intel Mobile Pentium, for notebooks, and

    the Motorola Dragon Ball (MC68328), for handheld computers, are examples of

    processors that have these features.

    2.2 Advances in Microelectronics

    Reducing space between components within the integrated circuit, as permitted by the 0.25

    micron CMOS process technology, or the more recent 0.18 micron process technology,

    minimises the die area of silicon needed to produce a chip and increases the number of

    chips per silicon wafer. This directly reduces production costs, and allows the processor to

    be smaller and faster.

    Reducing space between components within the circuit also allows a voltage reduction

    inside the CPU. Reducing voltage inside the CPU, consists of powering the CPU core with

    a lower voltage than the motherboard. CPUs working this way are called split coreprocessors. The first implementation of the split core CPU technology was the Pentium.

    The core of the chip operated at 2.9 V while interfacing to the motherboard at 3.3 V [7].

    This enabled a CPU power saving of 23%. The 0.25 micron technology made possible an

    even larger voltages reduction, enabling the manufacturing of split core processors

    running at 1.8 V while interfacing to other components at 2.5 V.

    The 400 MHz version of Pentium III is available with both the 0.18 micron and the

    0.25 micron technology, having a core voltage of 1,5 V in both cases. The former

    dissipates 7.5 W of power, while the last dissipates 9.2 W of power, a difference of about

    20%.

    2.3 Increasing Code Density

    Code density is inversely proportional to memory size. And reducing memory size, reduces

    both the overall size of the system and the use of power to maintain memory data. Due to

    their fixed instruction length, applications on RISC architectures have longer code than on

    CISC processors [8]. Nevertheless, embedded systems that require some performance

    improvement techniques, as is the case of handheld computers, normally prefer RISC

    processors, because fixed-instruction length enables the use of techniques like pipelining.

    The way some handheld designers found to increase code density using RISC

    architectures was to reduce the instructions length. Another way is to enlarge the

    instruction set of the CPU having one specialised instruction to do what several standardinstructions could do. This not only increases code density but also improves the system

    performance, allowing faster DSP, multimedia, etc..

    In the field of mobile computing, this is only a constraint to handheld computers, as

    they require an even higher portability. Notebooks usually do not care about code density.

    2.4 Peripheral Integration

    Integrating the CPU and peripheral controllers within the same chip reduces the overall

    system size and cost, while contributing to save power in handheld and embedded systems

    [8]. Processors that have peripheral integration, used for handheld computers, include the

    NEC VR4111 and the Intel StrongARM SA-1100. These processors include logic fordisplay and keyboard controlling, among other integrated functions. They also have a DSP

    3

  • 8/6/2019 42-MobComp

    4/8

    functional unit , which is an important feature for mobile computing.

    2.5 Allowing the OS to have control over the power management

    Power management as a functional unit within the CPU has some limitations. It only

    allows shutdowns after a certain period of inactivity of the peripherals or the CPU, and theOS is never informed of the parts of the system that have been shutdown. The first step

    towards informing the OS of the parts of the system that were not available was made by

    Microsoft and Intel, introducing the APM (Advanced Power Management) enabling

    communication between the OS and the power management code embedded into the

    BIOS. Now the OS knows what the BIOS is going to do, but it remained a power

    management based on a time out concept.

    In 1997, Intel, Toshiba and Microsoft introduced the Advanced Configuration and

    Power Interface (ACPI). The ACPI allows for collection of information about power

    consumption from all over the system, giving that information to the OS, which has

    complete device activity control, enabling it to provide power to the devices only when

    they need it [7]. Support for ACPI has to be provided both by the processor and the OS.Pentium based notebooks running Windows 95 (or higher) have support for ACPI.

    3 Mobility requirements

    Mobility places many demands on a system. The network address of a mobile computer

    (mobile station) changes dynamically, as it moves. Its current network access point may

    determine system configuration, such as current servers location, if the nearest server shall

    be used. Another problem is accessing location dependent data, like the possible ways to

    go to the City Hall, or which movies are in the Town Cinemas. In this section, the threemain issues introduced by mobility are discussed.

    3.1 Address Migration

    In the Internet Protocol (IP), moving to a new location implies acquiring a new IP name.

    To communicate with a mobile computer, messages must be sent to its most recent address.

    The basic mechanisms that can be used to determine the current address of a mobile

    computer are:

    Selective broadcast. A message is sent to a set of cells near the cell corresponding to

    the last known address of the mobile station, asking it to report its current location. Central services. In this method, the current address for each mobile computer is

    maintained in a logically centralised database. Each time a mobile computer

    changes its address it sends a message to update the database. This database may be

    physically distributed or replicated in the network nodes to improve response time.

    Home bases. This method is similar to the previous one. But, here only one server

    knows the current address of a mobile computer.

    Forwarding pointers. Each time a mobile computer changes its address, a copy of

    (pointer to) the new address is kept at the old location. Each message is propagated

    through the chain of pointers until it reaches the mobile computer. This method

    requires a process at the old location to receive and forward messages.

    4

  • 8/6/2019 42-MobComp

    5/8

    3.2 Location Migration

    While taking an effort to determine which server is near to it, for a given service, a mobile

    computer may keep moving making the path to that server grow. Because the physical

    distance between two points may not be proportional to the network distance, moving themobile computer a few meters may result in a much longer path in the network. And,

    longer paths mean greater risks of disconnection or data losses.

    3.3 Accessing Location Dependent Data

    In traditional desktop computers, information that depends on location is configured

    statically, by human intervention, such as the local name server, printers, etc.. A

    requirement for mobile computing is to provide mechanisms to obtain configuration data

    for the current location.

    4 Wireless Communications requirements

    The need for network access together with the need for mobility leads mobile computing to

    the use of wireless communication. Wireless network access is more susceptible of

    unwanted disconnection, low bandwidth availability and highly variable network

    conditions.

    Due to mobility, wireless connections may be lost or degraded, and due to the cellular

    nature of mobile telecommunications networks, such as GSM1or UMTS, if there are too

    many mobile users within a cell, network capacity may overload. The main constraints

    addressed by wireless communications are:

    Network disconnection

    Low bandwidth and bandwidth variability

    Security risks

    There are several ways to deal with these constraints.

    4.1 Network Disconnection

    Mobile computers run great risks of getting disconnected from the network. To overrun

    this problem, mobile computing has to either try to prevent a disconnection or try to deal

    autonomously with disconnection. Trying to prevent a disconnection usually compromises

    portability. Thus, the best way to deal with network disconnection is to treat network

    access in an adaptive manner, enabling disconnected operation. Such adaptation to the

    network conditions may either be performed by the OS or by both the OS and the

    applications. If disconnection is handled transparently by the OS, mobile applications may

    be developed without disconnection concerns, just like traditional client/server applications

    1 Global System for Mobile Communications (GSM) is a digital cellular radio networkoperating in most countries world-wide. It operates in three different frequency ranges:

    900 MHz (most common in Europe and the world), 1800 MHz (rapidly increasing inEurope), and 1900 MHz (the only frequency used in USA and Canada for GSM). A goodoverview of GSM network architecture can be found in [10].

    5

  • 8/6/2019 42-MobComp

    6/8

    over wired networks. One way the OS has to deal with short term disconnection is working

    asynchronously [5]. As opposed to synchronous remote procedure calls, where the client

    stops waiting for the servers reply, in asynchronous operation a client sends multiple

    requests before asking for an acknowledgement. Prefetching and lazy write-back of data in

    the server, also improves toleration to short term disconnection. These techniques, enable

    the masking of some network failures.Another way to have the OS dealing with total disconnection, permitting disconnected

    operation, is to cache a set of entire files in the mobile computer based on the users

    profile, such as in the Coda file system [2]. When the network reconnects, the cache is

    automatically synchronised with the repository server.

    Having the OS providing primitives so that the applications can deal with network

    conditions and other mobile environment conditions, such as low bandwidth, is the aim of

    the Odissey API [3].

    Naturally, not all network disconnections can be dealt transparently to the users point

    of view. In those cases, the user should be informed of the operations that cannot be

    performed during disconnection.

    4.2 Low Bandwidth and Bandwidth variability

    Wireless networks deliver lower bandwidth than wired networks. Radio transmission

    limitations, in terms of bandwidth and cost, do not allow GSM users to communicate with

    other users at rates higher than 9.6 Kbps. With UMTS2 it will be possible to communicate

    at rates higher than 11 Mbps. It will always be lower than wired networks bandwidth.

    With ISDN, users can communicate at rates higher than 2 Gbps.

    To improve network capacity there can be installed more wireless cells, either by

    overlapping cells on different wavelengths or by reducing transmission ranges in order to

    put more cells in a given area.

    Certain software techniques, such as compression, can also be used to deal with low

    bandwidth.

    Wireless Networking also suffers from a greater variation in network bandwidth than

    wired networking. Applications can deal with this bandwidth variability in the following

    ways:

    assuming low bandwidth connections, and not using available bandwidth when

    it is available;

    adapting to the currently available resources, providing a variable level of

    quality to the user.

    4.3 Security Risks

    Because it is easier to connect to a wireless link than to a wired one, the security of

    wireless communication can be of greater concern than the security of wired

    communication. Secure communication over insecure channels is accomplished by

    encryption [5]. This can either be done with software or, more efficiently, with hardware.

    2 Todays cellular networks, such as GSM (Global System for Mobile Communications)are mainly circuit-switched, having connections depending on circuit availability. With

    packet-switched networks, such as UMTS (Universal Mobile TelecommunicationsSystem) it is possible to implement Virtual Circuits, having virtual connections alwaysavailable to any other end point in the network.

    6

  • 8/6/2019 42-MobComp

    7/8

    5 Digital Signal Processing

    Control signalling aims at managing the establishment, maintenance, and termination of

    signal circuits. Control signalling is used either between the subscriber and the network or

    between functional entities within the network. GSM, just like ISDN, uses the signalling

    system number 7 (SS7), which is an open-ended common-channel signalling standard that

    can be used over digital circuit-switched networks.

    There are specialised processors for signal processing, called Digital Signal Processors

    (DSPs). The main difference between a general purpose processor and a DSP processor is

    that a DSP has features designed to support high-performance, repetitive, numerically

    intensive tasks, which include [9]:

    Single-cycle multiply-accumulate capability. Some high performance DSPs have

    two multipliers that do two multiply-accumulate operations per instruction cycle.

    Specialised addressing modes, for example pre- and post-modification of address

    pointers.

    On-chip memory and peripherals controllers. DSPs generally feature multiple-

    access memory architectures that enable DSPs to complete several accesses to

    memory in a single instruction cycle.

    Specialised execution control. DSPs often provide a loop instruction that allows a

    loop to be repeated without having to spend any instruction cycles for updating and

    testing the loop counter or for jumping to the top of the loop.

    Several operations encoded in a single instruction. DSPs have irregular instruction

    sets, usually allowing several operations to be encoded in the same instruction. For

    example, a processor that uses 32-bit instructions may encode two additions, two

    multiplications and four 16-bit data moves into a single instruction. In general,

    DSPs instruction sets allow a data move to be performed in parallel with an

    arithmetic operation.

    6 Conclusions and Comments

    This communication is an overview of mobile computing architectural needs and the latest

    trends in fulfilling those needs. It has been stated the difference between portable

    computing and mobile computing, and the major features of mobile computing were

    identified.

    Today, the number of voice communications is, yet, greater than data communications.

    In fixed networking, the break-even is expected to happen in about one or two years. Inmobile networking it will take some years to have a break-even, though. Communication

    requirements of mobile computing will evolve as mobile applications get more complex,

    and wireless communications technology evolves.

    Due to the limitations of handheld systems, the wireless data market will be dominated

    by notebooks [6] for a few more years. Nevertheless, with current microelectronics

    technologies it is possible to integrate into the same chip a general-purpose processor withan instruction set extension for digital signal processing, encryption, and other functional

    units of a mobile station, allowing the production of notebooks and handheld systems

    7

  • 8/6/2019 42-MobComp

    8/8