The Landscape of Pervasive & Mobile Computing Standards Sumi Helal Synthesis Lectures on Mobile and Pervasive Computing Preface


J2ME NETWORK APPLICATION CONSTRAINTS



Download 0.57 Mb.
Page16/45
Date25.06.2017
Size0.57 Mb.
#21767
1   ...   12   13   14   15   16   17   18   19   ...   45

2.15 J2ME NETWORK APPLICATION CONSTRAINTS


Arguably, the biggest question about J2ME is whether we can build a sizable system on this platform. Here, we conservatively estimate the maximum size of an information system that could be implemented with J2ME.

We assume that we’re building a typical N-tier information system, divided into several layers: the interface level, business logic layer, and data representation layer. Clearly, as much computation as possible should be off-loaded from the phone to the server. This client will interact with business logic through an intermediate Web application and will use the server computer’s computational resources.

Apart from the data transfer rate, only one substantial limitation exists for implementing this architecture—the size of the mobile application on the phone. So, we must estimate the maximum size. We assume that we’re going to use the libraries mentioned earlier to transfer and protect structured data. We’ll also need the following components:


  • A kXML 1.0 library (approximately 14 Kbytes)

  • DES64 cryptography from BouncyCastle.org (approximately 11 Kbytes)

  • A user interface (approximately 5 Kbytes)

  • Network data transfer (approximately 3 Kbytes)

Thus, the mandatory part of the application is 33 Kbytes. If we add approximately 30 percent of this for business logics, we have a 44 Kbytes application. The maximum heap size for a mobile phone is approximately 128 Kbytes. Naturally, optional applications should occupy less space to allow for normal phone operation, so we accept the stricter 100 Kbytes limit. Considering that the average screen form with event handling and data validation fits into 1.5 Kbytes, we can implement approximately 45 moderately complicated forms with data validation. This should be enough for a medium-sized application.

Note that a mobile phone’s permanent memory could be higher than 128 Kbytes—for instance, it is possible to plug a flash multimedia card into the mobile device, adding over 256 Mbytes of storage. However, this is practically useless for applications because it wouldn’t increase the heap size. Nevertheless, we can devise more complicated uses for this excessive storage— for example, it could store a bigger replica of the remote database.

Some problems we’ve described occur because of deficiencies in available development tools. The more deep-rooted problems relate to the platform’s physical limitations, but these are also likely to get easier over time. In general, we found that the J2ME platform is mature enough to support serious applications. However, unsolved technical problems will likely appear as well on other mobile platforms such as i-Mode or Brew. We need additional research on mobile applications development. Until then, we hope this article helps programmers deal with some of these development problems and provides ideas for better development tools.

chapter 3



LOCATION BASED SERVICES

Location-Based Services: Back to the Future

Gainesville, Florida, 10 March 2012. Today, the Mobile Location-Based Services Summit hosted a panel entitled “What Was Wrong with First-Generation Location-Based Services?” The panel chair, Sumi Helal of the University of Florida, invited two world-class experts in LBS history and technology to discuss the topic: Paolo Bellavista of the University of Bologna and Axel Küpper of the University of Munich. The panel discussed the popularity of today’s LBSs and analyzed their distinguishing aspects in comparison with first-generation LBSs.

The panel was anything but controversial, with all panelists in total agreement on what initially went wrong and why today’s LBSs work. They analyzed how the failure unfolded to set the stage for a major paradigm shift in LBS business and technology and noted the milestones that shaped today’s LBSs.

3.1 Historical perspective


The panel opened with a historical overview of LBS evolution, which we quickly review here (see figure 3.1).

The main origin of LBS was the E911 (Enhanced 911) mandate, which the US government passed in 1996. The mandate was for mobile-network operators to locate emergency callers with prescribed accuracy, so that the operators could deliver a caller’s location to Public Safety Answering Points. Cellular technology couldn’t fulfill these accuracy demands back then, so operators

started enormous efforts to introduce advanced positioning methods.

To gain returns on the E911 investments, operators launched a series of commercial LBSs. In most cases, these consisted of finder services that, on request, delivered to users a list of nearby points of interest, such as restaurants or gas stations. However, most users weren’t interested in this kind of LBS, so many operators quickly phased Several significant developments and favorable conditions came together in 2005 to resurrect LBSs.

out their LBS offerings and stopped related development efforts.

It was 2005 before the LBS wind started blowing again—this time in the right direction. Several significant developments and favorable conditions came together at that time to resurrect LBSs. The emergence of GPS-capable mobile devices, the advent of the Web 2.0 paradigm, and the introduction of 3G broadband wireless services were among the enabling developments. In the meantime, small software and hardware companies realized a broad range of LBS capabilities for both mass and niche markets and laid down the foundation for a new generation of LBSs.

After the quick overview, the panel identified and extensively analyzed the five primary factors that collectively changed a commercial flop into a pervasive on-the-go service for consumers.

3.2 The evolution of LBS features


Early LBS was reactive, self-referencing, single-target, and content-oriented. This started to change with the maturation of low-power positioning technology (such as assisted GPS), LBS middleware technology, and 3G mobile networks.

In 2004, operators and other providers started offering services for fleet management and for tracking children and pets—these were the first examples of cross-referencing LBSs. Initial versions of these services were based on Cell-ID positioning using triangulation techniques, which suffered from low accuracy and were soon replaced by GPS.

With the emergence of GPS-capable mobiles, users started to write small applications passing location data to a central server to make their location available to other users. Soon, these early initiatives turned into professional businesses that created a broad range of proactive and multitarget services—such as for mobile gaming, marketing, and health. These developments were accompanied by



Figure 3.1. The evolution of location-based services. A timeline from the E911 mandate to current LBSs (the red arrows represent predictions).

Web 2.0: location became another context item exchanged between the members of a social network, which was the origin for location sharing, a basic function of many of today’s multitarget LBSs.

In analyzing rudimentary LBS compared to today’s sophisticated LBS, the panel identified four major changes that made it so today’s LBSs aren’t restricted to a few fixed services but instead appear as a broad set of different, dynamic, and feature-rich services that are both exciting and helpful to consumers.


Download 0.57 Mb.

Share with your friends:
1   ...   12   13   14   15   16   17   18   19   ...   45




The database is protected by copyright ©ininet.org 2024
send message

    Main page