Somo Banerjee

33
Software Engineering for Mobility: Yet Another Roadmap Gruia-Catalin Roman, Gian Pietro Picco, Amy L. Murphy Presenter: Somo Banerjee "The future lies in designing and selling computers that people don't realize are computers at all“ Adam Osborne

description

 

Transcript of Somo Banerjee

Page 1: Somo Banerjee

Software Engineering for Mobility: Yet Another Roadmap

Gruia-Catalin Roman, Gian Pietro Picco, Amy L. Murphy

Presenter: Somo Banerjee

"The future lies in designing and selling computers that people don't realize are computers at all“

Adam Osborne

Page 2: Somo Banerjee

Major trends in Computing

Page 3: Somo Banerjee

Evolution

Computing

--------------

Personal Computing - PC

Distributed Computing - LAN, WAN, Grid

Web Computing - WWW

Mobile Computing - PDAs, Cell Phones, SmartPhones

Pervasive Computing - !!!

Page 4: Somo Banerjee

Summarizing this Paper – 1

Mobile Computing

--------------------------

No fixed network structure

Nodes may come and go

Processes may move among nodes

Programs may evolve and change structure

Page 5: Somo Banerjee

Constants are now Variables

Variable Properties

---------------------------------- Location Environment Connectivity Bandwidth I/O devices Security Domain

Page 6: Somo Banerjee

DREAM Environment

Issues

-----------

Temporary (?) loss of network connectivity

Ad-hoc Resource Discovery

Scarce Resources

Low Battery Power

Slow CPU Speed

Small amount of Memory

Frequent and unannounced changes in the environment

Page 7: Somo Banerjee

DREAMy Devices

Comparison of some mobile devices

--------------------------------------------

Page 8: Somo Banerjee

Requirements for Mobility

Dynamic Reconfiguration

Adaptivity

Asynchronous Interaction

Context-Awareness

Lightweight Middleware

Page 9: Somo Banerjee

Summarizing this Paper - 2

Critical Dimensions

----------------------------

Space

Coordination

Page 10: Somo Banerjee

Space

-------

Physical Mobility

Logical Mobility

Summarizing this Paper - 3

Page 11: Somo Banerjee

Coordination

------------------

Resource Discovery

(Extent of) Knowledge about a Resource

Synchronization

Exchange of Information/Data/Code

Summarizing this Paper - 4

Page 12: Somo Banerjee

Summarizing this Paper - 5

Software Engineering

-------------------------------

Models

Algorithms

Page 13: Somo Banerjee

Summarizing this Paper - 6

Models

----------

Unit of mobility

Location

Context

Coordination Mechanism

Page 14: Somo Banerjee

Summarizing this Paper - 7

Algorithms

----------------

Control and manage location information of self and

neighbors

Spatial knowledge

Mobile component interaction and communication

Connectivity

Power Efficiency

Page 15: Somo Banerjee

Summarizing this Paper - 8

Systems Research

----------------------

Applications

Middleware

Page 16: Somo Banerjee

Summarizing this Paper - 9

Applications

---------------

Page 17: Somo Banerjee

Nomadic interaction

Ad-hoc interaction

Presence (“Find me”) interaction

Styles of Interaction

Page 18: Somo Banerjee

Summarizing this Paper – 10

Middleware

---------------

Logical Mobility is a design tool

Physical Mobility is a requirement

Page 19: Somo Banerjee

A Simple(?) Mobile Application

Central DB: e-Shopping Center

PC: Belongs to a pair of customers who are also married to each other

PDAs: One belonging to each of these two customers

E-Shopping System Snapshot

Page 20: Somo Banerjee

Middleware for Mobile Computing

Transparency or Awareness?

----------------------------------- Replication Context Location

Page 21: Somo Banerjee

Replication

How to Replicate? When to Replicate? How much to Replicate?

Page 22: Somo Banerjee

Context

Conflict Management Commit Protocol Knowledge about Environment

Page 23: Somo Banerjee

Location

Where? When? Whom?

Page 24: Somo Banerjee

Mobile Middleware Technologies - 1

Reflective-- OpenCorba, Open-ORB, DynamicTAO, XMIDDLE

Tuple Space-- LIME, TSpaces, JavaSpaces

Context-Aware-- Nexus

Event-Based-- Hermes

Page 25: Somo Banerjee

Mobile Middleware Technologies - 2

Page 26: Somo Banerjee

Some Viewpoints - 1

By 2005, the typical cell phone will be indistinguishable from a PDA, and at least one U.S. carrier will support both 802.11 and 2.5G or 3G on the same devices.

As an unexpected consequence of this dual-band support, we'll see some instances of bottom-up networks, where devices connect directly with each other on a peer-to-peer basis. This will be a viable alternative to the current monopoly of carriers' antennas.

-- John Jordan, principal, office of the chief technologist, Cap Gemini Ernst & Young U.S. LLC, Cambridge, Mass.

"Can I get it with side-by-side doors, an ice dispenser and a GSM connection in harvest gold?" There's always been a lot of talk about networking home appliances, but little action due to the

difficulties of pulling wire or making networking run over power lines. But inexpensive networking running over public cellular networks will finally make possible next-generation applications, like a refrigerator that hosts a Web site listing what groceries a family needs and accepts bids from the local stores that want their business.

And, of course, a screen on a refrigerator represents an amazing advertising opportunity for Duncan Hines, Kraft and every other food company. Retailer Fry's Electronics already has a refrigerator with an RJ45 jack installed. Cellular is just around the corner.

-- Sheldon Laube, chairman, CenterBeam Inc., Santa Clara, Calif.

Page 27: Somo Banerjee

Some Viewpoints - 2

As more and more nonvocal transactions are performed on our mobile phones, these devices will become the holder of our identities within the next five years. Much like the role of a driver's license, our mobile communications device will serve to authenticate individuals and securely contain credentials and certificates. Biometrics, embedded appropriately, would thwart identity theft. -- Peter Athanas, associate professor, Department of Electrical and Computer Engineering, Virginia Polytechnic Institute and State University, Blacksburg, Va.

Within the next five years, all front-end user interfaces for computing will be wireless. -- Sumit Deshpande and Don LeClair, technology strategists, Computer Associates International Inc., Islandia, N.Y.

By 2005, mobile access to information will seem as natural as remote control of a TV. In fact, we'll wonder why we spent so much time at a desk. -- Jacob Christfort, chief technology officer for the Mobile Products and Services Division, Oracle Corp.

Page 28: Somo Banerjee

Virus!!!

[June 23, 2004]  

Mobile Computing Security Through Obscurity Last week, Kaspersky Labs announced the discovery of the first virus to

infect mobile phones. The virus, which Kaspersky named Cabir, affects mobile phones that use the Symbian OS. The virus is relatively harmless--its only purpose is to propagate itself, and it does so only to other phones that have Bluetooth enabled and are broadcasting their presence. However, Denis Zenkin, head of Corporate Communications at Kaspersky Labs, said that sooner or later, more malicious forms of mobile phone malware that will possibly destroy or steal data will begin to spread. http://www.windowsitpro.com/Article/ArticleID/43071/43071.html

Page 29: Somo Banerjee

Virus!!!

BRADOR TROJAN (WINDOWS CE)

MOSQUIT TROJAN (SYMBIAN)

NETSEC Security Brief October 2004 titled “Mobile Computing Security Threats”

Page 30: Somo Banerjee

So! The Other Side

Security Trust Privacy

Page 31: Somo Banerjee

Before you go

Four probable areas of research

------------------------------------ Reconfigurable Systems Context Modeling Security-Trust-Privacy Efficient Wireless Connectivity

Page 32: Somo Banerjee

About the Paper - Positives

Nice analysis of Mobility in comparison with Distributed Systems

Critical Dimensions recognized Theory Issues well-treated

Page 33: Somo Banerjee

About the Paper - Negatives

Verbose Security and Resource Constraint are not

treated as first-class concerns Does not categorically mention areas where

research needs to be done, rather leaves them as suggestions